4
CVSSv2

CVE-2019-10868

Published: 05/04/2019 Updated: 26/08/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

In trytond/model/modelstorage.py in Tryton 4.2 prior to 4.2.21, 4.4 prior to 4.4.19, 4.6 prior to 4.6.14, 4.8 prior to 4.8.10, and 5.0 prior to 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tryton trytond

debian debian linux 9.0

Vendor Advisories

Cedric Krier discovered that missing access validation in Tryton could result in information disclosure For the stable distribution (stretch), this problem has been fixed in version 421-2+deb9u1 We recommend that you upgrade your tryton-server packages For the detailed security status of tryton-server please refer to its security tracker page ...