We found results for “”
CVE-2022-26661
Good to know:
Date: March 7, 2022
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Language: Python
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Improper Restriction of XML External Entity Reference
CWE-611Top Fix
Upgrade Version
Upgrade to version trytond - 5.0.46;trytond - 6.0.16;trytond - 6.2.6;proteus - 5.0.12;proteus - 6.0.5;proteus - 6.2.2;tryton - 5.0.12
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
CVSS v2
| Base Score: |
|
|---|---|
| Access Vector (AV): | NETWORK |
| Access Complexity (AC): | LOW |
| Authentication (AU): | SINGLE |
| Confidentiality (C): | PARTIAL |
| Integrity (I): | NONE |
| Availability (A): | NONE |
| Additional information: |
Vulnerabilities
Projects
Contact Us


