CVE-2015-0861
Debian Security Advisory 3425-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.
model/modelstorage.py en trytond 3.2.x en versiones anteriores a 3.2.10, 3.4.x en versiones anteriores a 3.4.8, 3.6.x en versiones anteriores a 3.6.5 y 3.8.x en versiones anteriores a 3.8.1 permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y escribir en campos arbitrarios a través de una secuencia de registros.
Cedric Krier discovered a vulnerability in the server-side of Tryton, an application framework written in Python. An authenticated malicious user can write arbitrary values in record fields due missed checks of access permissions when multiple records are written.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-01-07 CVE Reserved
- 2015-12-17 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://bugs.tryton.org/issue5167 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2015/dsa-3425 | 2019-02-01 | |
http://www.tryton.org/posts/security-release-for-issue5167.html | 2019-02-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 3.2.0 < 3.2.10 Search vendor "Tryton" for product "Trytond" and version " >= 3.2.0 < 3.2.10" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 3.4.0 < 3.4.8 Search vendor "Tryton" for product "Trytond" and version " >= 3.4.0 < 3.4.8" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 3.6.0 < 3.6.5 Search vendor "Tryton" for product "Trytond" and version " >= 3.6.0 < 3.6.5" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 3.8.0 < 3.8.1 Search vendor "Tryton" for product "Trytond" and version " >= 3.8.0 < 3.8.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|