An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
Link | Tags |
---|---|
https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059 | vendor advisory |
https://bugs.tryton.org/issue11244 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00016.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/03/msg00017.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5098 | third party advisory vendor advisory |
https://www.debian.org/security/2022/dsa-5099 | third party advisory vendor advisory |