CVE-2022-26662
Published Mar 10, 2022
Last updated 3 years ago
Overview
- Description
- An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-776
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D19FC38-D40C-4A7C-99E3-42621FE4C431", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE9FF23A-193D-4259-8F56-210FFCFE9576", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56DC449B-B042-4FDD-B7B7-9CFF27A008FE", "versionEndExcluding": "6.2.2", "versionStartIncluding": "6.2.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC63578-DEAD-4070-9C57-18B57104F94B", "versionEndExcluding": "5.0.46", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49798AD5-E1A7-46DE-B0AC-9F6BA201BBCB", "versionEndExcluding": "6.0.16", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA10D50-8E3E-47F0-8C6A-F849F27B5F44", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" } ], "operator": "OR" } ] } ]