The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-0142 The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
Github GHSA Github GHSA GHSA-32w7-9whp-cjp9 Session Fixation in Tryton
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:11.446Z

Reserved: 2018-11-22T00:00:00

Link: CVE-2018-19443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-22T19:29:00.220

Modified: 2024-11-21T03:57:55.777

Link: CVE-2018-19443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.