PYSEC-2022-43171

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/tryton/PYSEC-2022-43171.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2022-43171
Aliases
Published
2022-03-10T17:47:00Z
Modified
2024-11-21T14:59:33.219130Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.

References

Affected packages

PyPI / tryton

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.0.0
Fixed
5.0.12
Introduced
6.0.0
Fixed
6.0.5
Introduced
6.2.0
Fixed
6.2.2
Fixed
6.2.6
Fixed
6.0.16
Fixed
5.0.46

Affected versions

5.*

5.0.0
5.0.1
5.0.2
5.0.3
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9
5.0.10
5.0.11

6.*

6.0.0
6.0.1
6.0.2
6.0.3
6.0.4
6.2.0
6.2.1