logo

CVE-2022-26662 tryton

Package

Manager: pip
Name: tryton
Vulnerable Version: =5.0.0 || =5.0.1 || =5.0.10 || =5.0.11 || =5.0.2 || =5.0.3 || =5.0.4 || =5.0.5 || =5.0.6 || =5.0.7 || =5.0.8 || =5.0.9 || =6.0.0 || =6.0.1 || =6.0.2 || =6.0.3 || =6.0.4 || =6.2.0 || =6.2.1 || >=5.0.0 <5.0.12

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.04112 pctl0.88162

Details

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

Metadata

Created: 2022-03-10T17:47:00Z
Modified: 2024-11-21T14:57:07.796966Z
Source: https://osv-vulnerabilities
CWE IDs: N/A
Alternative ID: N/A
Finding: F083
Auto approve: 1