Man-in-the-Middle (MitM) Affecting tryton package, versions [5.0.0, 5.0.1)
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Threat Intelligence
EPSS
0.13% (48th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-TRYTON-72631
- published 28 Nov 2018
- disclosed 22 Nov 2018
- credit Cedric Krier
Introduced: 22 Nov 2018
CVE-2018-19443 Open this link in a new tabHow to fix?
Upgrade tryton
to version 5.0.1 or higher.
Overview
tryton is a three-tiers high-level general purpose application platform written in Python and use Postgresql as database engine.
Affected versions of this package are vulnerable to Man in the middle attack. The client tried to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py
and jsonrpc.py
. This connection attempt failed, but it contained in the header the current session of the user. This session could then be stolen by a man-in-the-middle.