CVE-2018-19443

EUVD-2018-0142
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
Affected Products (NVD)
VendorProductVersion
trytontryton
5.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tryton-client
bookworm
6.0.26-1+deb12u1
fixed
bullseye
5.0.33-1
fixed
sid
7.0.15-4
fixed
trixie
7.0.15-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tryton-client
bionic
needs-triage
cosmic
ignored
disco
ignored
eoan
ignored
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
dne
xenial
needs-triage