Headline
CVE-2021-23176: [SEC] CVE-2021-23176 - Improper access control in reporting engine o... · Issue #107682 · odoo/odoo
Improper access control in reporting engine of l10n_fr_fec module in Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows remote authenticated users to extract accounting information via crafted RPC packets.
Security Advisory - CVE-2021-23176
Affects: Odoo 15.0 and earlier (Community and Enterprise Editions)
CVE ID: CVE-2021-23176
Component: l10n_fr_fec
Credits: Florent Mirieu de la barre
Improper access control in reporting engine of l10n_fr_fec module in Odoo
Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier allows
remote authenticated users to extract accounting information via crafted
RPC packets.
I. Background
The l10n_fr_fec module is a module for the accounting localization of France
allowing to generate the Fichier d’Échange Informatisé (FEC).
II. Problem Description
The generation of the report was not properly protected and could be accessed
by users without accounting access rights.
III. Impact
Attack Vector: Network exploitable
Authentication: Employee / Portal user account required
CVSS3 Score: Medium :: 6.5
CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Malicious users (including portal user accounts) on an Odoo database
might craft RPC requests specifically targeted at extracting accounting
data from the database.
Odoo S.A. is not aware of any use of this vulnerability in the wild.
IV. Workaround
Until the deployment of the patch, the l10n_fr_fec module can be
uninstalled on unpatched database. Updating to the latest revision or
applying the corresponding patch is strongly recommended.
V. Solution
Update to the latest revision, either via GitHub or by downloading it:
https://www.odoo.com/page/download
If updating is not an option, you may instead apply the patch corresponding
to your Odoo installation (links provided below).
For the actual update procedure, please refer to our update instructions, valid
for all versions: https://www.odoo.com/documentation/15.0/setup/update.html
VI. Correction details
The following list contains the patches that fix the vulnerability for
each version:
- 13.0: 0ef5489
- 14.0: f166400
- 15.0: 66f0a38
- 15.0-ent, 14.0-ent, 13.0-ent (Enterprise): see 15.0, 14.0 and 13.0.
Related news
Debian Linux Security Advisory 5399-1 - Several vulnerabilities were discovered in odoo, a suite of web based open source business apps.