Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D140CBF-E659-4E87-8FEE-F19CD2E6B947", "vulnerable": true}, {"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*", "matchCriteriaId": "C3F9E8F1-FAF7-44AE-8D05-BE717D247EDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "167C709E-C8B2-4CCB-963E-E1D8C664190A", "vulnerable": true}, {"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*", "matchCriteriaId": "C52F2EEB-11E5-49E8-AD06-3014FF2C2D24", "vulnerable": true}, {"criteria": "cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A4405E54-6C16-49D5-B632-3D72091B2FEB", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used."}, {"lang": "es", "value": "En Odoo versi\u00f3n 8.0, Odoo Community Edition versiones 9.0 y 10.0, y Odoo Community Edition versiones 9.0 y 10.0, los atacantes remotos pueden omitir la identificaci\u00f3n bajo ciertas circunstancias porque los par\u00e1metros que contienen caracteres 0x00 est\u00e1n truncados antes de alcanzar la capa de base de datos. Esto ocurre porque es usado Psycopg versi\u00f3n 2.x anterior a 2.6.3."}], "id": "CVE-2017-10804", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-07-04T18:29:00.227", "references": [{"source": "cve@mitre.org", "tags": ["Release Notes"], "url": "http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3"}, {"source": "cve@mitre.org", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/odoo/odoo/issues/17914"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/psycopg/psycopg2/issues/420"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes"], "url": "http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Third Party Advisory"], "url": "https://github.com/odoo/odoo/issues/17914"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/psycopg/psycopg2/issues/420"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}