CVE-2022-26662 – proteus
Package
Manager: pip
Name: proteus
Vulnerable Version: >=5.0.0 <5.0.12 || >=6.0.0 <6.0.5 || >=6.2.0 <6.2.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.04112 pctl0.88162
Details
XML Entity Expansion in trytond and proteus An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Metadata
Created: 2022-03-11T00:02:04Z
Modified: 2022-03-28T15:56:34Z
Source: MANUAL
CWE IDs: ["CWE-776"]
Alternative ID: GHSA-pm3h-mm62-pwm8
Finding: F083
Auto approve: 1