logo

CVE-2022-26662 proteus

Package

Manager: pip
Name: proteus
Vulnerable Version: >=5.0.0 <5.0.12 || >=6.0.0 <6.0.5 || >=6.2.0 <6.2.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.04112 pctl0.88162

Details

XML Entity Expansion in trytond and proteus An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

Metadata

Created: 2022-03-11T00:02:04Z
Modified: 2022-03-28T15:56:34Z
Source: MANUAL
CWE IDs: ["CWE-776"]
Alternative ID: GHSA-pm3h-mm62-pwm8
Finding: F083
Auto approve: 1