logo

CVE-2022-26661 proteus

Package

Manager: pip
Name: proteus
Vulnerable Version: >=5.0.0 <5.0.12 || >=6.0.0 <6.0.5 || >=6.1.0 <6.2.2

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00474 pctl0.63827

Details

Improper Restriction of XML External Entity Reference in trytond and proteus An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.

Metadata

Created: 2022-03-11T00:02:02Z
Modified: 2022-03-28T15:56:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-cj78-rgw3-4h5p/GHSA-cj78-rgw3-4h5p.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-cj78-rgw3-4h5p
Finding: F083
Auto approve: 1