The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
References
Link | Resource |
---|---|
https://bugs.tryton.org/issue7792 | Issue Tracking Third Party Advisory |
https://discuss.tryton.org/t/security-release-for-issue7792/830 | Vendor Advisory |
https://bugs.tryton.org/issue7792 | Issue Tracking Third Party Advisory |
https://discuss.tryton.org/t/security-release-for-issue7792/830 | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.tryton.org/issue7792 - Issue Tracking, Third Party Advisory | |
References | () https://discuss.tryton.org/t/security-release-for-issue7792/830 - Vendor Advisory |
Information
Published : 2018-11-22 19:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-19443
Mitre link : CVE-2018-19443
CVE.ORG link : CVE-2018-19443
JSON object : View
Products Affected
tryton
- tryton
CWE
CWE-384
Session Fixation