Lucene search

K
githubGitHub Advisory DatabaseGHSA-7CWG-2575-3546
HistoryMay 13, 2022 - 1:39 a.m.

Tryton Information Disclosure Vulnerability

2022-05-1301:39:57
CWE-269
GitHub Advisory Database
github.com
3
tryton
file_open
vulnerability
remote authenticated users
permissions
arbitrary files
same root name
suffix attack
incomplete fix
cve-2016-1242
software

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

4.7

Confidence

High

EPSS

0.002

Percentile

54.2%

file_open in Tryton 3.x and 4.x through 4.2.2 allows remote authenticated users with certain permissions to read arbitrary files via a “same root name but with a suffix” attack. NOTE: This vulnerability exists because of an incomplete fix for CVE-2016-1242.

Affected configurations

Vulners
Node
trytontrytondRange4.2.2
OR
trytontrytondRange4.0.9
OR
trytontrytondRange3.8.14
OR
trytontrytondRange3.6.16
OR
trytontrytondRange3.4.17
OR
trytontrytondRange3.2.17
OR
trytontrytondRange3.0.17

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

4.7

Confidence

High

EPSS

0.002

Percentile

54.2%