Summary
Cedric Krier discovered that the Tryton client does not sanitize the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the user running the client has write access.
Solution
For the oldstable distribution (squeeze), this problem has been fixed in version 1.6.1-1+deb6u1.
For the stable distribution (wheezy), this problem has been fixed in version 2.2.3-1+deb7u1.
We recommend that you upgrade your tryton-client packages.
Insight
Tryton is a high-level general purpose application platform written in Python and using PostgreSQL as database engine. It is the core base of a complete business solution.
Affected
tryton-client on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2013-4510 -
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:C/A:N
Related Vulnerabilities