Vulnerability Description
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tryton | Trytond | >= 4.2.0, < 4.2.21 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://discuss.tryton.org/t/security-release-for-issue8189/1262Vendor Advisory
- https://hg.tryton.org/trytond/rev/f58bbfe0aefbPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Apr/14Mailing ListThird Party Advisory
- https://www.debian.org/security/2019/dsa-4426Third Party Advisory
- https://discuss.tryton.org/t/security-release-for-issue8189/1262Vendor Advisory
- https://hg.tryton.org/trytond/rev/f58bbfe0aefbPatchVendor Advisory
- https://seclists.org/bugtraq/2019/Apr/14Mailing ListThird Party Advisory
- https://www.debian.org/security/2019/dsa-4426Third Party Advisory
FAQ
What is CVE-2019-10868?
CVE-2019-10868 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field fo...
How severe is CVE-2019-10868?
CVE-2019-10868 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10868?
Check the references section above for vendor advisories and patch information. Affected products include: Tryton Trytond, Debian Debian Linux.