CVE-2019-10868: Tryton Improper Access Control
(updated )
In trytond/model/modelstorage.py
in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
References
- discuss.tryton.org/t/security-release-for-issue8189/1262
- github.com/advisories/GHSA-f6f2-pwrj-64h3
- github.com/pypa/advisory-database/tree/main/vulns/trytond/PYSEC-2019-127.yaml
- github.com/tryton/trytond
- hg.tryton.org/trytond/rev/f58bbfe0aefb
- nvd.nist.gov/vuln/detail/CVE-2019-10868
- seclists.org/bugtraq/2019/Apr/14
- www.debian.org/security/2019/dsa-4426
Detect and mitigate CVE-2019-10868 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →