| Vulnerability Name: | CVE-2022-26662 (CCN-221167) | ||||||||||||
| Assigned: | 2022-02-11 | ||||||||||||
| Published: | 2022-02-11 | ||||||||||||
| Updated: | 2022-03-18 | ||||||||||||
| Summary: | An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-776 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2022-26662 Source: CCN Type: Tryton issue tracker Issue 11244 A non authenticated user can cause a denial of service with a single request using an xml bomb attack on xmlrpc Source: MISC Type: Patch, Vendor Advisory https://bugs.tryton.org/issue11244 Source: MISC Type: Vendor Advisory https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059 Source: XF Type: UNKNOWN tryton-cve202226662-dos(221167) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220310 [SECURITY] [DLA 2945-1] tryton-server security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20220311 [SECURITY] [DLA 2946-1] tryton-proteus security update Source: DEBIAN Type: Third Party Advisory DSA-5098 Source: DEBIAN Type: Third Party Advisory DSA-5099 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||