In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.
References
Link | Resource |
---|---|
https://github.com/psycopg/psycopg2/issues/420 | Exploit Third Party Advisory |
https://github.com/odoo/odoo/issues/17914 | Patch Third Party Advisory |
http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 | Release Notes |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-07-04 11:29
Updated : 2017-07-12 12:04
NVD link : CVE-2017-10804
Mitre link : CVE-2017-10804
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
odoo
- odoo