[6.0][6.1] Stock module contains SQL injection vulnerability

Bug #1014759 reported by Olivier Dony (Odoo)
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Odoo Addons (MOVED TO GITHUB)
Fix Released
Critical
OpenERP's Framework R&D

Bug Description

== Summary ==

The Warehouse Management Module (stock) is vulnerable to SQL injection attacks in the `context' parameter of the `get_product_available' method, in the `product.product' model.

This vulnerability is present in the following OpenERP versions:
- OpenERP 6.0.3 and later
- OpenERP 6.1 (all versions)

== Impact ==

Access Vector: Network exploitable
Access Complexity: Medium
Authentication: Required to exploit

An attacker could pass a specially-crafted `context' parameter to the vulnerable function, possibly executing arbitrary SQL queries in the database. Such queries could alter business data or security related information such as user passwords and access rights.

Exploiting this vulnerability requires:
- remote network access to the vulnerable OpenERP system
- the credentials (user and password) of a user having access to Warehouse Management data

We are not aware of any malicious use if this vulnerability.

== Workaround ==

No known workaround is available, but systems without the stock module installed are not vulnerable.
Systems running versions earlier than 6.0.3 are not vulnerable.
OpenERP Online servers have been patched as of the day of discovery.

== Solution ==

Apply the attached patch, or upgrade to the latest OpenERP nightly builds for your series, as found on http://www.openerp.com/downloads or http://nightly.openerp.com, dated after 2012-06-19.

To apply the patch, change into the root directory of the addons installation, then execute the patch command, such as:
   patch -p0 -f < /path/to/the_patch_file.patch

Related branches

Revision history for this message
Olivier Dony (Odoo) (odo-openerp) wrote :
Revision history for this message
Olivier Dony (Odoo) (odo-openerp) wrote :

The following are the revision numbers of stable releases of `openobject-addons' after which the vulnerability is corrected:

- 6.1 series revno: 6850 rev-id: <email address hidden>
- 6.0 series revno: 5263 rev-id: <email address hidden>

Changed in openobject-addons:
status: Confirmed → Fix Released
assignee: Olivier Dony (OpenERP) (odo-openerp) → OpenERP's Framework R&D (openerp-dev-framework)
Revision history for this message
Olivier Dony (Odoo) (odo-openerp) wrote :

Making public, non-disclosure period has expired.

visibility: private → public
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.