logo

CVE-2016-1242 trytond

Package

Manager: pip
Name: trytond
Vulnerable Version: >=0 <3.2.17 || >=3.4 <3.4.14 || >=3.6 <3.6.12 || >=3.8 <3.8.8 || >=4.0 <4.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00213 pctl0.43825

Details

Tryton allow authenticated users with certain permissions to read arbitrary files via the name parameter `file_open` in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allows remote authenticated users with certain permissions to read arbitrary files via the name parameter or unspecified other vectors.

Metadata

Created: 2022-05-17T03:05:04Z
Modified: 2024-11-22T18:17:33Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-jpr7-8rxm-4vgx/GHSA-jpr7-8rxm-4vgx.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-jpr7-8rxm-4vgx
Finding: F310
Auto approve: 1