CVE-2019-10868
Published Apr 5, 2019
Last updated 4 years ago
Overview
- Description
- In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-862
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9925F13-AEA1-4726-8DB7-42A626ED6B21", "versionEndExcluding": "4.2.21", "versionStartIncluding": "4.2.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38362452-A804-44A3-B9EE-7191D286C524", "versionEndExcluding": "4.4.19", "versionStartIncluding": "4.4.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10DCAA26-5678-4B8A-A6AC-42FFDA218994", "versionEndExcluding": "4.6.14", "versionStartIncluding": "4.6.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB3F196B-0C8D-45B7-AA88-85A11F5F743F", "versionEndExcluding": "4.8.10", "versionStartIncluding": "4.8.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14871B48-2153-4E13-B722-FF4D74794225", "versionEndExcluding": "5.0.6", "versionStartIncluding": "5.0.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ], "operator": "OR" } ] } ]