UBUNTU-CVE-2019-11780

Source
https://ubuntu.com/security/CVE-2019-11780
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11780.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-11780
Upstream
Published
2019-12-19T16:16:00Z
Modified
2025-10-24T04:47:39Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Improper access control in the computed fields system of the framework of Odoo Community 13.0 and Odoo Enterprise 13.0 allows remote authenticated attackers to access sensitive information via crafted RPC requests, which could lead to privilege escalation.

References

Affected packages

Ubuntu:20.04:LTS / oca-core

Package

Name
oca-core
Purl
pkg:deb/ubuntu/oca-core@11.0.20180730-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

11.*
11.0.20180730-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "11.0.20180730-1",
            "binary_name": "oca-core"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-11780.json"