CVE-2022-26662
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Se ha detectado un problema de tipo XML Entity Expansion (XEE) en Tryton Application Platform (Server) versiones 5.x hasta 5.0.45, versiones 6.x hasta 6.0.15 y versiones 6.1.x y 6.2.x hasta 6.2.5, y Tryton Application Platform (Command Line Client (proteus)) versiones 5.x hasta 5.0.11, versiones 6.x hasta 6.0.4 y versiones 6.1.x y 6.2.x hasta 6.2.1. Un usuario no autenticado puede enviar un mensaje XML-RPC diseƱado para consumir todos los recursos del servidor
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-03-07 CVE Reserved
- 2022-03-07 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugs.tryton.org/issue11244 | 2022-03-18 |
URL | Date | SRC |
---|---|---|
https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059 | 2022-03-18 | |
https://www.debian.org/security/2022/dsa-5098 | 2022-03-18 | |
https://www.debian.org/security/2022/dsa-5099 | 2022-03-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 5.0.0 < 5.0.12 Search vendor "Tryton" for product "Proteus" and version " >= 5.0.0 < 5.0.12" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 6.0.0 < 6.0.5 Search vendor "Tryton" for product "Proteus" and version " >= 6.0.0 < 6.0.5" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Proteus Search vendor "Tryton" for product "Proteus" | >= 6.2.0 < 6.2.2 Search vendor "Tryton" for product "Proteus" and version " >= 6.2.0 < 6.2.2" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 5.0.0 < 5.0.46 Search vendor "Tryton" for product "Trytond" and version " >= 5.0.0 < 5.0.46" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 6.0.0 < 6.0.16 Search vendor "Tryton" for product "Trytond" and version " >= 6.0.0 < 6.0.16" | - |
Affected
| ||||||
Tryton Search vendor "Tryton" | Trytond Search vendor "Tryton" for product "Trytond" | >= 6.2.0 < 6.2.6 Search vendor "Tryton" for product "Trytond" and version " >= 6.2.0 < 6.2.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
|