Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2018-19443: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2018-19443: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
11/22/2018
Created
03/19/2019
Added
12/23/2018
Modified
06/20/2021

Description

The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.

Solution(s)

  • suse-upgrade-tryton
  • suse-upgrade-trytond
  • suse-upgrade-trytond_account
  • suse-upgrade-trytond_account_invoice
  • suse-upgrade-trytond_purchase_request
  • suse-upgrade-trytond_stock
  • suse-upgrade-trytond_stock_supply

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;