vulnerability
SUSE: CVE-2018-19443: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Nov 22, 2018 | Dec 23, 2018 | Jun 20, 2021 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Nov 22, 2018
Added
Dec 23, 2018
Modified
Jun 20, 2021
Description
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
Solutions
suse-upgrade-trytonsuse-upgrade-trytondsuse-upgrade-trytond_accountsuse-upgrade-trytond_account_invoicesuse-upgrade-trytond_purchase_requestsuse-upgrade-trytond_stocksuse-upgrade-trytond_stock_supply
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.