file_open in Tryton 3.x and 4.x through 4.2.2 allows remote authenticated users with certain permissions to read arbitrary files via a "same root name but with a suffix" attack. NOTE: This vulnerability exists because of an incomplete fix for CVE-2016-1242.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| trytond(PyPI) | 3.0.0 | N/A | N/A |
| trytond(PyPI) | 3.2.0 | N/A | N/A |
| trytond(PyPI) | 3.4.0 | N/A | N/A |
| trytond(PyPI) | 3.6.0 | N/A | N/A |
| trytond(PyPI) | 3.8.0 | N/A | N/A |
| trytond(PyPI) | 4.0.0 | N/A | N/A |
| trytond(PyPI) | 4.2.0 | 4.2.3 | N/A |
CVSS Metrics