Vulnerability Name:

CVE-2015-0861 (CCN-112665)

Assigned:2015-01-07
Published:2016-04-13
Updated:2019-02-01
Summary:model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.
CVSS v3 Severity:4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2015-0861

Source: DEBIAN
Type: Vendor Advisory
DSA-3425

Source: CCN
Type: trytond Web site
trytond

Source: CONFIRM
Type: Vendor Advisory
http://www.tryton.org/posts/security-release-for-issue5167.html

Source: CONFIRM
Type: Exploit, Vendor Advisory
https://bugs.tryton.org/issue5167

Source: XF
Type: UNKNOWN
trytond-cve20150861-sec-bypass(112665)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tryton:trytond:*:*:*:*:*:*:*:* (Version >= 3.2.0 and < 3.2.10)
  • OR cpe:/a:tryton:trytond:*:*:*:*:*:*:*:* (Version >= 3.4.0 and < 3.4.8)
  • OR cpe:/a:tryton:trytond:*:*:*:*:*:*:*:* (Version >= 3.6.0 and < 3.6.5)
  • OR cpe:/a:tryton:trytond:*:*:*:*:*:*:*:* (Version >= 3.8.0 and < 3.8.1)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:8.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.xenial:def:201508610000000
    V
    CVE-2015-0861 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-04-13
    oval:com.ubuntu.artful:def:20150861000
    V
    CVE-2015-0861 on Ubuntu 17.10 (artful) - medium.
    2016-04-13
    oval:com.ubuntu.xenial:def:20150861000
    V
    CVE-2015-0861 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-04-13
    oval:com.ubuntu.bionic:def:20150861000
    V
    CVE-2015-0861 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-04-13
    oval:com.ubuntu.precise:def:20150861000
    V
    CVE-2015-0861 on Ubuntu 12.04 LTS (precise) - medium.
    2016-04-13
    oval:com.ubuntu.bionic:def:201508610000000
    V
    CVE-2015-0861 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-04-13
    oval:com.ubuntu.trusty:def:20150861000
    V
    CVE-2015-0861 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-04-13
    oval:org.cisecurity:def:361
    P
    DSA-3425-1 -- tryton-server -- security update
    2016-02-26
    BACK
    tryton trytond *
    tryton trytond *
    tryton trytond *
    tryton trytond *
    debian debian linux 8.0