Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19443

Опубликовано: 22 нояб. 2018
Источник: debian
EPSS Низкий

Описание

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tryton-clientnot-affectedpackage

Примечания

  • https://discuss.tryton.org/t/security-release-for-issue7792/830

  • https://bugs.tryton.org/issue7792

EPSS

Процентиль: 42%
0.00196
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

CVSS3: 5.9
nvd
около 7 лет назад

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

suse-cvrf
около 7 лет назад

Security update for tryton

suse-cvrf
около 7 лет назад

Security update for tryton

CVSS3: 5.9
github
около 7 лет назад

Session Fixation in Tryton

EPSS

Процентиль: 42%
0.00196
Низкий