Описание
Tryton Improper Access Control
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-10868
- https://discuss.tryton.org/t/security-release-for-issue8189/1262
- https://github.com/pypa/advisory-database/tree/main/vulns/trytond/PYSEC-2019-127.yaml
- https://hg.tryton.org/trytond/rev/f58bbfe0aefb
- https://seclists.org/bugtraq/2019/Apr/14
- https://www.debian.org/security/2019/dsa-4426
Пакеты
trytond
>= 4.2.0, < 4.2.21
4.2.21
trytond
>= 4.4.0, < 4.4.19
4.4.19
trytond
>= 4.6.0, < 4.6.14
4.6.14
trytond
>= 4.8.0, < 4.8.10
4.8.10
trytond
>= 5.0.0, < 5.0.6
5.0.6
Связанные уязвимости
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 befo ...
Уязвимость компонента modelstorage.py платформы для разработки приложений Tryton, связанная с неправильным контролем доступа, позволяющая нарушителю раскрыть защищаемую информацию