mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.5 KiB
JSON
77 lines
2.5 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@debian.org",
|
|
"ID": "CVE-2012-0215",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Python does not properly restrict access to the Many2Many field in the relation model, which allows remote authenticated users to modify the privileges of arbitrary users via a (1) create, (2) write, (3) delete, or (4) copy rpc call."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "DSA-2444",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2012/dsa-2444"
|
|
},
|
|
{
|
|
"name": "https://bugs.tryton.org/issue2476",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugs.tryton.org/issue2476"
|
|
},
|
|
{
|
|
"name": "http://hg.tryton.org/trytond/rev/8e64d52ecea4",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://hg.tryton.org/trytond/rev/8e64d52ecea4"
|
|
},
|
|
{
|
|
"name": "http://news.tryton.org/2012/03/security-releases-for-all-supported.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://news.tryton.org/2012/03/security-releases-for-all-supported.html"
|
|
}
|
|
]
|
|
}
|
|
} |