Vulnerability Description
Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame introspection. Attackers can create a server script via the /app/server-script endpoint and access the gi_frame attribute to traverse the call stack and invoke os.popen to execute system commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Frappe | Erpnext | 13.4.0 |
Related Weaknesses (CWE)
References
- http://erpnext.orgProduct
- https://frappeframework.com/docs/v13/user/en/desk/scripting/server-scriptProduct
- https://gist.github.com/lebr0nli/c2fc617390451f0e5a4c31c87d8720b6Exploit
- https://github.com/frappe/frappe/Product
- https://github.com/frappe/frappe/blob/v13.4.0/frappe/utils/safe_exec.py#L42Product
- https://ur4ndom.dev/posts/2023-07-02-uiuctf-rattler-read/Not Applicable
- https://www.exploit-db.com/exploits/51580ExploitVDB Entry
- https://www.vulncheck.com/advisories/frappe-framework-erpnext-remote-code-executThird Party Advisory
FAQ
What is CVE-2023-54345?
CVE-2023-54345 is a vulnerability with a CVSS score of 8.8 (HIGH). Frappe Framework ERPNext 13.4.0 contains a sandbox escape vulnerability in RestrictedPython that allows authenticated users with System Manager role to execute arbitrary code by exploiting frame intro...
How severe is CVE-2023-54345?
CVE-2023-54345 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-54345?
Check the references section above for vendor advisories and patch information. Affected products include: Frappe Erpnext.