Description
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Published: 2022-03-07
Score: 7.5 High
EPSS: 5.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2945-1 tryton-server security update
Debian DLA Debian DLA DLA-2946-1 tryton-proteus security update
Debian DSA Debian DSA DSA-5098-1 tryton-server security update
Debian DSA Debian DSA DSA-5099-1 tryton-proteus security update
EUVD EUVD EUVD-2022-0343 An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Github GHSA Github GHSA GHSA-pm3h-mm62-pwm8 XML Entity Expansion in trytond and proteus
History

No history.

Subscriptions

Debian Debian Linux
Tryton Proteus Trytond
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:11:44.228Z

Reserved: 2022-03-07T00:00:00.000Z

Link: CVE-2022-26662

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-10T17:47:52.560

Modified: 2024-11-21T06:54:17.103

Link: CVE-2022-26662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses