Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-26662

Опубликовано: 10 мар. 2022
Источник: debian
EPSS Низкий

Описание

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tryton-proteusfixed6.0.5-1package
tryton-serverfixed6.0.16-1package

Примечания

  • https://bugs.tryton.org/issue11244

  • https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059

EPSS

Процентиль: 90%
0.05585
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

CVSS3: 7.5
nvd
почти 4 года назад

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

CVSS3: 7.5
github
почти 4 года назад

XML Entity Expansion in trytond and proteus

EPSS

Процентиль: 90%
0.05585
Низкий