An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2945-1 tryton-server security update
Debian DLA Debian DLA DLA-2946-1 tryton-proteus security update
Debian DSA Debian DSA DSA-5098-1 tryton-server security update
Debian DSA Debian DSA DSA-5099-1 tryton-proteus security update
EUVD EUVD EUVD-2022-0342 An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Github GHSA Github GHSA GHSA-cj78-rgw3-4h5p Improper Restriction of XML External Entity Reference in trytond and proteus
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:11:44.600Z

Reserved: 2022-03-07T00:00:00

Link: CVE-2022-26661

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-10T17:47:52.213

Modified: 2024-11-21T06:54:16.947

Link: CVE-2022-26661

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.