CVE-2018-15632

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to create empty databases in Odoo Community and Enterprise versions 11.0 and earlier. Attackers can then connect using default credentials, potentially gaining administrative access. All Odoo installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Odoo Community
  • Odoo Enterprise
Versions: 11.0 and earlier
Operating Systems: All platforms running Odoo
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the database creation logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access, steal sensitive business data, install malware, or use the system as a foothold for lateral movement.

🟠

Likely Case

Unauthorized database creation leading to data manipulation, privilege escalation, or disruption of business operations.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if the Odoo instance is exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with publicly available information. Attackers can use simple HTTP requests to trigger the database creation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Odoo 11.0+ with security patches applied

Vendor Advisory: https://github.com/odoo/odoo/issues/63700

Restart Required: Yes

Instructions:

1. Upgrade to Odoo 12.0 or later. 2. If staying on Odoo 11.0, apply the security patch from the Odoo repository. 3. Restart the Odoo service after patching.

🔧 Temporary Workarounds

Disable Database Manager

all

Prevents unauthorized database creation by disabling the database management interface

Edit Odoo configuration file and set 'list_db = False'
Restart Odoo service

Network Access Control

all

Restrict access to Odoo database creation endpoints

Configure firewall rules to block access to /web/database/manager and related endpoints
Use reverse proxy with access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Odoo instances from untrusted networks
  • Enable detailed logging and monitoring for database creation activities and unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Odoo version via web interface or configuration files. Versions 11.0 and earlier are vulnerable.

Check Version:

Check Odoo configuration file or run: python3 -c "import odoo; print(odoo.release.version)"

Verify Fix Applied:

Verify Odoo version is 12.0 or later, or confirm security patches from 2018 are applied. Test that unauthorized database creation is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database creation events
  • Failed authentication attempts with default credentials
  • Access to /web/database/manager from unauthorized sources

Network Indicators:

  • HTTP POST requests to database creation endpoints from unexpected IP addresses
  • Traffic patterns indicating database initialization

SIEM Query:

source="odoo.log" AND ("database creation" OR "/web/database/manager")

🔗 References

📤 Share & Export