VYPR
High severityOSV Advisory· Published Apr 5, 2019· Updated Aug 4, 2024

CVE-2019-10868

CVE-2019-10868

Description

In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In Tryton before versions 4.2.21, 4.4.19, 4.6.14, 4.8.10, and 5.0.6, an authenticated user can order records by a field they lack access rights to, potentially guessing field values.

Vulnerability

The vulnerability exists in trytond/model/modelstorage.py of the Tryton server. An authenticated user can order records based on a field for which they have no explicit access right. This flaw affects Tryton versions 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6 [1]. The root cause is missing access validation when processing ordering criteria in database queries.

Exploitation

Exploitation requires prior authentication to the Tryton system. The attacker does not need any special privileges beyond a valid user account. By carefully crafting queries that sort results by a protected field, the attacker can infer the field's value based on the order of returned records, even without direct read permissions [1][2].

Impact

Successful exploitation leads to information disclosure. An attacker can guess the values of restricted fields by observing the order of records. For example, sorting by a salary field could reveal ranges or relative values. The impact is limited to information that can be inferred through ordering, but this could compromise sensitive business data [2].

Mitigation

The issue is fixed in Tryton versions 4.2.21, 4.4.19, 4.6.14, 4.8.10, and 5.0.6. Debian has released security update DSA-4426-1 addressing this CVE [2]. Users should upgrade to the patched versions; no workaround is documented.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
trytondPyPI
>= 4.2.0, < 4.2.214.2.21
trytondPyPI
>= 4.4.0, < 4.4.194.4.19
trytondPyPI
>= 4.6.0, < 4.6.144.6.14
trytondPyPI
>= 4.8.0, < 4.8.104.8.10
trytondPyPI
>= 5.0.0, < 5.0.65.0.6

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.