To paraphrase, the issue was that you could click on some malicious link that makes you trigger an API call to ERPNext that potentially modifies some entries. Clicking on a link corresponds to a GET request. This issue has been addressed by restricting some of frappe frameworksâ core API endpoints to non-GET requests:
If you find any other whitelisted methods that allow modifying data through a GET request, please report them as a vulnerability to Security (or the corresponding custom app provider).
Thanks for the update. I can see the github issue and commits. But the CVE is still not closed and probably because the github issue doesnât reference the CVE number. Could someone from Frappe mark that CVE as closed with reference to this github issue? (like how all other CVEs have been closedâŚ)
A CVE record never flips to a âclosedâ or âresolvedâ state the way a ticket in a bug-tracker does. Once published it stays on the public list forever. The only three official CVE states are RESERVED â PUBLISHED â REJECTED.