4
CVSSv2

CVE-2022-26661

Published: 10/03/2022 Updated: 18/03/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

An XXE issue exists in Tryton Application Platform (Server) 5.x up to and including 5.0.45, 6.x up to and including 6.0.15, and 6.1.x and 6.2.x up to and including 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x up to and including 5.0.11, 6.x up to and including 6.0.4, and 6.1.x and 6.2.x up to and including 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tryton proteus

tryton trytond

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service For the oldstable distribution (buster), these problems have been fixed in version 504-2+deb10u1 For the stable distribution (bullseye), these problems have been fixed in version 5033-2+ ...
Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service For the oldstable distribution (buster), these problems have been fixed in version 501-3+deb10u1 For the stable distribution (bullseye), these problems have been fixed in version 508-1+d ...