Show plain JSON{"id": "CVE-2022-26662", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2022-03-10T17:47:52.560", "references": [{"url": "https://bugs.tryton.org/issue11244", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.debian.org/security/2022/dsa-5098", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.debian.org/security/2022/dsa-5099", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-776"}]}], "descriptions": [{"lang": "en", "value": "An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server."}, {"lang": "es", "value": "Se ha detectado un problema de tipo XML Entity Expansion (XEE) en Tryton Application Platform (Server) versiones 5.x hasta 5.0.45, versiones 6.x hasta 6.0.15 y versiones 6.1.x y 6.2.x hasta 6.2.5, y Tryton Application Platform (Command Line Client (proteus)) versiones 5.x hasta 5.0.11, versiones 6.x hasta 6.0.4 y versiones 6.1.x y 6.2.x hasta 6.2.1. Un usuario no autenticado puede enviar un mensaje XML-RPC dise\u00f1ado para consumir todos los recursos del servidor"}], "lastModified": "2022-03-18T15:07:58.183", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D19FC38-D40C-4A7C-99E3-42621FE4C431", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0.0"}, {"criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE9FF23A-193D-4259-8F56-210FFCFE9576", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0"}, {"criteria": "cpe:2.3:a:tryton:proteus:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56DC449B-B042-4FDD-B7B7-9CFF27A008FE", "versionEndExcluding": "6.2.2", "versionStartIncluding": "6.2.0"}, {"criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC63578-DEAD-4070-9C57-18B57104F94B", "versionEndExcluding": "5.0.46", "versionStartIncluding": "5.0.0"}, {"criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49798AD5-E1A7-46DE-B0AC-9F6BA201BBCB", "versionEndExcluding": "6.0.16", "versionStartIncluding": "6.0.0"}, {"criteria": "cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA10D50-8E3E-47F0-8C6A-F849F27B5F44", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}, {"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}, {"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}