Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: python313Packages.trytond

Found 1 matching suggestions

View:
Compact
Detailed
Permalink CVE-2020-37014
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 removed package tryton
  • @jopejoe1 dismissed
Tryton 5.4 - Persistent Cross-Site Scripting

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

Affected products

Tryton
  • =<5.4

Matching in nixpkgs

Package maintainers

Current stable was never impacted

https://github.com/NixOS/nixpkgs/commit/218c8509c6ce25945c2c253d15e9542033d4de44