CVE-2022-26661
Published Mar 10, 2022
Last updated 3 years ago
Overview
- Description
- An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-611
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D19FC38-D40C-4A7C-99E3-42621FE4C431", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE9FF23A-193D-4259-8F56-210FFCFE9576", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56DC449B-B042-4FDD-B7B7-9CFF27A008FE", "versionEndExcluding": "6.2.2", "versionStartIncluding": "6.2.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC63578-DEAD-4070-9C57-18B57104F94B", "versionEndExcluding": "5.0.46", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49798AD5-E1A7-46DE-B0AC-9F6BA201BBCB", "versionEndExcluding": "6.0.16", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA10D50-8E3E-47F0-8C6A-F849F27B5F44", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" } ], "operator": "OR" } ] } ]