Description
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
Published: 2018-11-22
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-0142 The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
Github GHSA Github GHSA GHSA-32w7-9whp-cjp9 Session Fixation in Tryton
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:37:11.446Z

Reserved: 2018-11-22T00:00:00.000Z

Link: CVE-2018-19443

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-22T19:29:00.220

Modified: 2024-11-21T03:57:55.777

Link: CVE-2018-19443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses