model/modelstorage.py in trytond 3.2.x before 3.2.10, 3.4.x before 3.4.8, 3.6.x before 3.6.5, and 3.8.x before 3.8.1 allows remote authenticated users to bypass intended access restrictions and write to arbitrary fields via a sequence of records.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.debian.org/security/2015/dsa-3425 | Vendor Advisory | 
| http://www.tryton.org/posts/security-release-for-issue5167.html | Vendor Advisory | 
| https://bugs.tryton.org/issue5167 | Exploit Vendor Advisory | 
| http://www.debian.org/security/2015/dsa-3425 | Vendor Advisory | 
| http://www.tryton.org/posts/security-release-for-issue5167.html | Vendor Advisory | 
| https://bugs.tryton.org/issue5167 | Exploit Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 02:23
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.debian.org/security/2015/dsa-3425 - Vendor Advisory | |
| References | () http://www.tryton.org/posts/security-release-for-issue5167.html - Vendor Advisory | |
| References | () https://bugs.tryton.org/issue5167 - Exploit, Vendor Advisory | 
Information
                Published : 2016-04-13 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-0861
Mitre link : CVE-2015-0861
CVE.ORG link : CVE-2015-0861
JSON object : View
Products Affected
                tryton
- trytond
debian
- debian_linux
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
