// For flags

CVE-2015-0861

Debian Security Advisory 3425-1

Severity Score

4.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.

model/modelstorage.py en trytond 3.2.x en versiones anteriores a 3.2.10, 3.4.x en versiones anteriores a 3.4.8, 3.6.x en versiones anteriores a 3.6.5 y 3.8.x en versiones anteriores a 3.8.1 permite a usuarios remotos autenticados eludir las restricciones destinadas al acceso y escribir en campos arbitrarios a través de una secuencia de registros.

Cedric Krier discovered a vulnerability in the server-side of Tryton, an application framework written in Python. An authenticated malicious user can write arbitrary values in record fields due missed checks of access permissions when multiple records are written.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-01-07 CVE Reserved
  • 2015-12-17 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tryton
Search vendor "Tryton"
Trytond
Search vendor "Tryton" for product "Trytond"
>= 3.2.0 < 3.2.10
Search vendor "Tryton" for product "Trytond" and version " >= 3.2.0 < 3.2.10"
-
Affected
Tryton
Search vendor "Tryton"
Trytond
Search vendor "Tryton" for product "Trytond"
>= 3.4.0 < 3.4.8
Search vendor "Tryton" for product "Trytond" and version " >= 3.4.0 < 3.4.8"
-
Affected
Tryton
Search vendor "Tryton"
Trytond
Search vendor "Tryton" for product "Trytond"
>= 3.6.0 < 3.6.5
Search vendor "Tryton" for product "Trytond" and version " >= 3.6.0 < 3.6.5"
-
Affected
Tryton
Search vendor "Tryton"
Trytond
Search vendor "Tryton" for product "Trytond"
>= 3.8.0 < 3.8.1
Search vendor "Tryton" for product "Trytond" and version " >= 3.8.0 < 3.8.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected