Safety vulnerability ID: 53924
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Trytond 4.4.0 includes a fix CVE-2017-0360: file_open in Tryton 3.x and 4.x through 4.4.0 allows remote authenticated users with certain permissions to read arbitrary files via a "same root name but with a suffix" attack. This vulnerability exists because of an incomplete fix for CVE-2016-1242.
https://github.com/tryton/trytond/commit/30e978593733385db3144f8c583eeb4679575cf0
Latest version: 7.4.1
Tryton server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application