CVE-2012-0215 – trytond
Package
Manager: pip
Name: trytond
Vulnerable Version: >=0 <2.4.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00617 pctl0.69001
Details
Trytond allows modification of privileges of arbitrary users `model/modelstorage.py` in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call.
Metadata
Created: 2022-05-04T00:28:50Z
Modified: 2024-11-18T21:06:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-cqg4-rf29-3mv6/GHSA-cqg4-rf29-3mv6.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-cqg4-rf29-3mv6
Finding: F039
Auto approve: 1