First published: Wed Jul 03 2019(Updated: )
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Odoo Odoo | =9.0 | |
Odoo Odoo | =9.0 | |
Odoo Odoo | =10.0 | |
Odoo Odoo | =10.0 | |
Odoo Odoo | =11.0 | |
Odoo Odoo | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-14866.
The affected software for this vulnerability is Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier.
The severity of CVE-2018-14866 is medium with a severity value of 4.3.
Authenticated attackers exploit CVE-2018-14866 by making an RPC call before garbage collection occurs to access data in transient records that they do not own.
Yes, a fix is available for this vulnerability. It is recommended to update to a version that is not affected by the vulnerability.