CVE-2022-26661
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Se ha detectado un problema de tipo XXE en Tryton Application Platform (Server) versiones 5.x hasta 5.0.45, versiones 6.x hasta 6.0.15, y versiones 6.1.x y 6.2.x hasta 6.2.5, y Tryton Application Platform (Command Line Client (proteus)) versiones 5.x hasta 5.0.11, versiones 6.x hasta 6.0.4, y versiones 6.1.x y 6.2.x hasta 6.2.1. Un usuario autenticado puede hacer que el servidor analice un archivo XML SEPA diseƱado para acceder a archivos arbitrarios en el sistema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-07 CVE Reserved
- 2022-03-07 CVE Published
- 2023-09-28 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-611: Improper Restriction of XML External Entity Reference
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://bugs.tryton.org/issue11219 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059 | 2022-03-18 | |
https://www.debian.org/security/2022/dsa-5098 | 2022-03-18 | |
https://www.debian.org/security/2022/dsa-5099 | 2022-03-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 5.0.0 < 5.0.12 Search vendor "Tryton" for product "Proteus" and version " >= 5.0.0 < 5.0.12" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 6.0.0 < 6.0.5 Search vendor "Tryton" for product "Proteus" and version " >= 6.0.0 < 6.0.5" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 6.2.0 < 6.2.2 Search vendor "Tryton" for product "Proteus" and version " >= 6.2.0 < 6.2.2" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 5.0.0 < 5.0.46 Search vendor "Tryton" for product "Trytond" and version " >= 5.0.0 < 5.0.46" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 6.0.0 < 6.0.16 Search vendor "Tryton" for product "Trytond" and version " >= 6.0.0 < 6.0.16" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 6.2.0 < 6.2.6 Search vendor "Tryton" for product "Trytond" and version " >= 6.2.0 < 6.2.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|