Security Release for issue #14363

Abdulfatah Abdillahi has found that sao does not escape the completion values. The content of completion is generally the record name which may be edited in many ways depending on the model. The content may include some JavaScript which is executed in the same context as sao which gives access to sensitive data such as the session.

Impact

CVSS v3.0 Base Score: 7.3

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Scope: Unchanged
  • Confidentiality: High
  • Integrity: High
  • Availability: None

Workaround

There is no general workaround.

Resolution

All affected users should upgrade sao to the latest version.

Affected versions per series:

  • sao:
    • 7.6: <= 7.6.10
    • 7.4: <= 7.4.20
    • 7.0: <= 7.0.39
    • 6.0: <= 6.0.68

Non affected versions per series:

  • sao:
    • 7.6: >= 7.6.11
    • 7.4: >= 7.4.21
    • 7.0: >= 7.0.40
    • 6.0: >= 6.0.69

Reference

Concerns?

Any security concerns should be reported on the bug-tracker at https://bugs.tryton.org/ with the confidential checkbox checked.