Debian DSA-5399-1 : odoo - security update

high Nessus Plugin ID 175152

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has a package installed that is affected by multiple vulnerabilities as referenced in the dsa-5399 advisory.

- A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read and write local files on the server. (CVE-2021-23166)

- Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets. (CVE-2021-23176)

- Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows attackers to validate online payments with a tokenized payment method that belongs to another user, causing the victim's payment method to be charged instead. (CVE-2021-23178)

- A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to access and modify database contents of other tenants, in a multi-tenant system. (CVE-2021-23186)

- Improper access control in reporting engine of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to download PDF reports for arbitrary documents, via crafted requests. (CVE-2021-23203)

- Cross-site scripting (XSS) issue in Discuss app of Odoo Community 14.0 through 15.0, and Odoo Enterprise 14.0 through 15.0, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents. (CVE-2021-26263)

- Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link.
(CVE-2021-26947)

- A sandboxing issue in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows authenticated administrators to read local files on the server, including sensitive configuration files.
(CVE-2021-44476)

- Cross-site scripting (XSS) issue in Website app of Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, by posting crafted contents. (CVE-2021-44775)

- Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via crafted uploaded file names. (CVE-2021-45071)

- Improper access control in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to trigger the creation of demonstration data, including user accounts with known credentials. (CVE-2021-45111)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the odoo packages.

For the stable distribution (bullseye), these problems have been fixed in version 14.0.0+dfsg.2-7+deb11u1.

See Also

https://security-tracker.debian.org/tracker/source-package/odoo

https://www.debian.org/security/2023/dsa-5399

https://security-tracker.debian.org/tracker/CVE-2021-23166

https://security-tracker.debian.org/tracker/CVE-2021-23176

https://security-tracker.debian.org/tracker/CVE-2021-23178

https://security-tracker.debian.org/tracker/CVE-2021-23186

https://security-tracker.debian.org/tracker/CVE-2021-23203

https://security-tracker.debian.org/tracker/CVE-2021-26263

https://security-tracker.debian.org/tracker/CVE-2021-26947

https://security-tracker.debian.org/tracker/CVE-2021-44476

https://security-tracker.debian.org/tracker/CVE-2021-44775

https://security-tracker.debian.org/tracker/CVE-2021-45071

https://security-tracker.debian.org/tracker/CVE-2021-45111

https://packages.debian.org/source/bullseye/odoo

Plugin Details

Severity: High

ID: 175152

File Name: debian_DSA-5399.nasl

Version: 1.0

Type: local

Agent: unix

Published: 5/5/2023

Updated: 5/5/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2021-45111

CVSS v3

Risk Factor: High

Base Score: 8.7

Temporal Score: 7.6

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2021-23186

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:odoo-14, cpe:/o:debian:debian_linux:11.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 5/5/2023

Vulnerability Publication Date: 4/25/2023

Reference Information

CVE: CVE-2021-23166, CVE-2021-23176, CVE-2021-23178, CVE-2021-23186, CVE-2021-23203, CVE-2021-26263, CVE-2021-26947, CVE-2021-44476, CVE-2021-44775, CVE-2021-45071, CVE-2021-45111