First published: Tue Jul 04 2017(Updated: )
In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Odoo Odoo | =8.0 | |
Odoo Odoo | =9.0 | |
Odoo Odoo | =9.0 | |
Odoo Odoo | =10.0 | |
Odoo Odoo | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10804 is classified as a medium severity vulnerability due to the potential for authentication bypass.
To fix CVE-2017-10804, it is recommended to update to a patched version of Odoo that addresses this authentication bypass issue.
CVE-2017-10804 affects Odoo versions 8.0, 9.0, and 10.0 for both Community and Enterprise Editions.
Yes, remote attackers may exploit CVE-2017-10804 to bypass authentication under specific conditions.
CVE-2017-10804 is caused by the truncation of parameters containing 0x00 characters before they reach the database layer.