In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://github.com/odoo/odoo/issues/17914 | third party advisory patch |
http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 | release notes |
https://github.com/psycopg/psycopg2/issues/420 | third party advisory exploit |