logo

CVE-2022-26661 trytond

Package

Manager: pip
Name: trytond
Vulnerable Version: >=5.0.0 <5.0.46 || >=6.0.0 <6.0.16 || >=6.1.0 <6.2.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00474 pctl0.63836

Details

Improper Restriction of XML External Entity Reference in trytond and proteus An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.

Metadata

Created: 2022-03-11T00:02:02Z
Modified: 2022-03-28T15:56:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-cj78-rgw3-4h5p/GHSA-cj78-rgw3-4h5p.json
CWE IDs: ["CWE-611"]
Alternative ID: GHSA-cj78-rgw3-4h5p
Finding: F083
Auto approve: 1