5
CVSSv2

CVE-2022-26662

Published: 10/03/2022 Updated: 18/03/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An XML Entity Expansion (XEE) issue exists in Tryton Application Platform (Server) 5.x up to and including 5.0.45, 6.x up to and including 6.0.15, and 6.1.x and 6.2.x up to and including 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x up to and including 5.0.11, 6.x up to and including 6.0.4, and 6.1.x and 6.2.x up to and including 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tryton proteus

tryton trytond

debian debian linux 9.0

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service For the oldstable distribution (buster), these problems have been fixed in version 504-2+deb10u1 For the stable distribution (bullseye), these problems have been fixed in version 5033-2+ ...
Jeremy Mousset discovered two XML parsing vulnerabilities in the Tryton application platform, which may result in information disclosure or denial of service For the oldstable distribution (buster), these problems have been fixed in version 501-3+deb10u1 For the stable distribution (bullseye), these problems have been fixed in version 508-1+d ...