In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.
References
Link | Resource |
---|---|
http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 | Release Notes |
https://github.com/odoo/odoo/issues/17914 | Patch Third Party Advisory |
https://github.com/psycopg/psycopg2/issues/420 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-07-04T18:00:00
Updated: 2017-07-04T17:57:01
Reserved: 2017-07-03T00:00:00
Link: CVE-2017-10804
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-07-04T18:29:00.227
Modified: 2017-07-12T19:04:25.083
Link: CVE-2017-10804
JSON object: View
Redhat Information
No data.
CWE