An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2945-1 tryton-server security update
Debian DLA Debian DLA DLA-2946-1 tryton-proteus security update
Debian DSA Debian DSA DSA-5098-1 tryton-server security update
Debian DSA Debian DSA DSA-5099-1 tryton-proteus security update
EUVD EUVD EUVD-2022-0343 An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Github GHSA Github GHSA GHSA-pm3h-mm62-pwm8 XML Entity Expansion in trytond and proteus
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:11:44.228Z

Reserved: 2022-03-07T00:00:00

Link: CVE-2022-26662

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-10T17:47:52.560

Modified: 2024-11-21T06:54:17.103

Link: CVE-2022-26662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.