Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-32w7-9whp-cjp9

Опубликовано: 29 нояб. 2018
Источник: github
Github: Прошло ревью
CVSS4: 8.2
CVSS3: 5.9

Описание

Session Fixation in Tryton

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

Пакеты

Наименование

tryton

pip
Затронутые версииВерсия исправления

= 5.0.0

5.0.1

EPSS

Процентиль: 42%
0.00196
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-384

Связанные уязвимости

CVSS3: 5.9
ubuntu
около 7 лет назад

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

CVSS3: 5.9
nvd
около 7 лет назад

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

CVSS3: 5.9
debian
около 7 лет назад

The client in Tryton 5.x before 5.0.1 tries to make a connection to th ...

suse-cvrf
около 7 лет назад

Security update for tryton

suse-cvrf
около 7 лет назад

Security update for tryton

EPSS

Процентиль: 42%
0.00196
Низкий

8.2 High

CVSS4

5.9 Medium

CVSS3

Дефекты

CWE-384