In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.
References
Link | Resource |
---|---|
http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 | Release Notes |
https://github.com/odoo/odoo/issues/17914 | Patch Third Party Advisory |
https://github.com/psycopg/psycopg2/issues/420 | Exploit Third Party Advisory |
http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 | Release Notes |
https://github.com/odoo/odoo/issues/17914 | Patch Third Party Advisory |
https://github.com/psycopg/psycopg2/issues/420 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 - Release Notes | |
References | () https://github.com/odoo/odoo/issues/17914 - Patch, Third Party Advisory | |
References | () https://github.com/psycopg/psycopg2/issues/420 - Exploit, Third Party Advisory |
Information
Published : 2017-07-04 18:29
Updated : 2024-11-21 03:06
NVD link : CVE-2017-10804
Mitre link : CVE-2017-10804
CVE.ORG link : CVE-2017-10804
JSON object : View
Products Affected
odoo
- odoo
CWE
CWE-306
Missing Authentication for Critical Function