Miggo Logo

CVE-2017-0360:
Tryton Information Disclosure Vulnerability

5.3

CVSS Score
3.0

Basic Information

EPSS Score
0.54229%
Published
5/13/2022
Updated
11/18/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
trytondpip>= 3.0.0, <= 3.0.17
trytondpip>= 3.2.0, <= 3.2.17
trytondpip>= 3.4.0, <= 3.4.17
trytondpip>= 3.6.0, <= 3.6.16
trytondpip>= 3.8.0, <= 3.8.14
trytondpip>= 4.0.0, <= 4.0.9
trytondpip>= 4.2.0, <= 4.2.24.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the insecure path validation in secure_join, as shown in the commit diff. The patch modified this function to address the suffix bypass, and the associated test case in test_tools.py explicitly tests for this attack vector. The CWE-269 (Improper Privilege Management) aligns with the function's failure to properly restrict file access. While file_open is the entry point, the root cause is the flawed logic in secure_join.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*il*_op*n in Tryton *.x *n* *.x t*rou** *.*.* *llows r*mot* *ut**nti**t** us*rs wit* **rt*in p*rmissions to r*** *r*itr*ry *il*s vi* * "s*m* root n*m* *ut wit* * su**ix" *tt**k. NOT*: T*is vuln*r**ility *xists ****us* o* *n in*ompl*t* *ix *or *V*-***

Reasoning

T** vuln*r**ility st*ms *rom t** ins**ur* p*t* v*li**tion in `s**ur*_join`, *s s*own in t** *ommit *i**. T** p*t** mo*i*i** t*is *un*tion to ***r*ss t** su**ix *yp*ss, *n* t** *sso*i*t** t*st **s* in `t*st_tools.py` *xpli*itly t*sts *or t*is *tt**k v