CVE-2022-26662

Source
https://cve.org/CVERecord?id=CVE-2022-26662
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-26662.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-26662
Aliases
Downstream
Published
2022-03-07T22:40:00Z
Modified
2026-05-01T04:10:50.795140Z
Summary
[none]
Details

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

Database specific
{
    "cna_assigner": "mitre",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/26xxx/CVE-2022-26662.json",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "introduced": "5.x"
                },
                {
                    "fixed": "5.0.45"
                },
                {
                    "introduced": "6.x"
                },
                {
                    "fixed": "6.0.15"
                },
                {
                    "introduced": "6.2.x"
                },
                {
                    "fixed": "6.2.5"
                },
                {
                    "introduced": "5.x"
                },
                {
                    "fixed": "5.0.11"
                },
                {
                    "introduced": "6.x"
                },
                {
                    "fixed": "6.0.4"
                },
                {
                    "introduced": "6.2.x"
                },
                {
                    "fixed": "6.2.1"
                }
            ],
            "source": "DESCRIPTION"
        }
    ]
}
References

Affected packages

Git / github.com/tryton/trytond

Affected ranges

Type
GIT
Repo
https://github.com/tryton/trytond
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "5.0.0"
        },
        {
            "fixed": "5.0.12"
        },
        {
            "fixed": "5.0.46"
        },
        {
            "introduced": "6.0.0"
        },
        {
            "fixed": "6.0.5"
        },
        {
            "fixed": "6.0.16"
        },
        {
            "introduced": "6.2.0"
        },
        {
            "fixed": "6.2.2"
        },
        {
            "fixed": "6.2.6"
        }
    ],
    "cpe": [
        "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*"
    ],
    "source": "CPE_FIELD"
}

Affected versions

5.*
5.0.0
5.0.1
5.0.10
5.0.11
5.0.12
5.0.13
5.0.14
5.0.15
5.0.16
5.0.17
5.0.18
5.0.19
5.0.2
5.0.20
5.0.21
5.0.22
5.0.23
5.0.24
5.0.25
5.0.26
5.0.27
5.0.28
5.0.29
5.0.3
5.0.30
5.0.31
5.0.32
5.0.33
5.0.34
5.0.35
5.0.36
5.0.37
5.0.38
5.0.39
5.0.4
5.0.40
5.0.41
5.0.42
5.0.43
5.0.44
5.0.45
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9
6.*
6.0.0
6.0.1
6.0.10
6.0.11
6.0.12
6.0.13
6.0.14
6.0.15
6.0.2
6.0.3
6.0.4
6.0.5
6.0.6
6.0.7
6.0.8
6.0.9
6.2.0
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-26662.json"