Show plain JSON{"id": "CVE-2024-34074", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 6.1, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 2.7, "exploitabilityScore": 2.8}]}, "published": "2024-05-14T15:38:27.850", "references": [{"url": "https://github.com/frappe/frappe/commit/65b3c42635038cdff17d3109be6c373bac004829", "source": "security-advisories@github.com"}, {"url": "https://github.com/frappe/frappe/pull/26304", "source": "security-advisories@github.com"}, {"url": "https://github.com/frappe/frappe/security/advisories/GHSA-7g27-q225-j894", "source": "security-advisories@github.com"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-601"}]}], "descriptions": [{"lang": "en", "value": "Frappe is a full-stack web application framework. Prior to 15.26.0 and 14.74.0, the login page accepts redirect argument and it allowed redirect to untrusted external URls. This behaviour can be used by malicious actors for phishing. This vulnerability is fixed in 15.26.0 and 14.74.0."}, {"lang": "es", "value": "Frappe es un framework de aplicaci\u00f3n web completo. Antes de 15.26.0 y 14.74.0, la p\u00e1gina de inicio de sesi\u00f3n acepta el argumento de redireccionamiento y permit\u00eda el redireccionamiento a URL externas que no son de confianza. Este comportamiento puede ser utilizado por actores malintencionados para realizar phishing. Esta vulnerabilidad se solucion\u00f3 en 15.26.0 y 14.74.0."}], "lastModified": "2024-05-14T16:12:23.490", "sourceIdentifier": "security-advisories@github.com"}