Vulnerabilites related to enalean - tuleap
Vulnerability from fkie_nvd
Published
2022-06-09 06:15
Modified
2024-11-21 06:51
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "92EF6BED-0507-466F-86D9-2BD080054445", "versionEndExcluding": "13.6-5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "12B7CD6D-1D15-4AC9-9500-DB77C2741CB3", "versionEndExcluding": "13.7.99.239", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "452FB6D4-A397-4F19-B67E-F6BBC619C7BF", "versionEndExcluding": "13.7-4", "versionStartIncluding": "13.7-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para administrar el desarrollo de software y la colaboraci\u00f3n. En versiones anteriores a 13.7.99.239, Tuleap no verifica apropiadamente las autorizaciones cuando muestra el contenido del renderizador de informes de seguimiento y los widgets de gr\u00e1ficos. Unos usuarios maliciosos podr\u00edan usar esta vulnerabilidad para recuperar el nombre de un rastreador al que no pueden acceder, as\u00ed como el nombre de los campos usados en los informes" } ], "id": "CVE-2022-24896", "lastModified": "2024-11-21T06:51:20.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-09T06:15:07.053", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=26729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=26729" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-29 18:15
Modified
2024-11-21 07:03
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "290E08AF-5F26-4777-AD57-9343595B5B75", "versionEndExcluding": "13.9.99.111", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "94F599E8-A949-4624-94D8-2B1AE92AFE64", "versionEndExcluding": "13.8.6", "versionStartIncluding": "13.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "196F5F96-ACA8-4072-A5D7-A54914138D64", "versionEndExcluding": "13.9.3", "versionStartIncluding": "13.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para mejorar la administraci\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones anteriores a 13.9.99.95, Tuleap no sanea apropiadamente las entradas del usuario cuando construye la consulta SQL para recuperar los datos de los informes de seguimiento. Un atacante con la capacidad de crear un nuevo rastreador puede ejecutar consultas SQL arbitrarias. Es recomendado a usuarios actualizar. No es conocida ninguna mitigaci\u00f3n para este problema" } ], "id": "CVE-2022-31058", "lastModified": "2024-11-21T07:03:48.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-29T18:15:08.807", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27172" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-25 18:15
Modified
2024-11-21 08:08
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "22469E90-AD27-4AE7-B3EE-AA093211124D", "versionEndExcluding": "14.9-5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "988A3CB6-2246-4A0C-90E9-7D0D647B3EEC", "versionEndExcluding": "14.10.99.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1D6E5BBF-1DA0-4F5E-BC10-2E8201BF244C", "versionEndExcluding": "14.10-2", "versionStartIncluding": "14.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix." } ], "id": "CVE-2023-35929", "lastModified": "2024-11-21T08:08:59.820", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T18:15:10.897", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=32629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=32629" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-11 19:15
Modified
2024-11-21 08:32
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EBC945C2-F92B-4763-81DE-D233176CA6D3", "versionEndExcluding": "15.1-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "72217C7D-C8D3-4647-8B76-72BD84D3962A", "versionEndExcluding": "15.2.99.103", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AE4D1FFC-AD00-4040-BD6A-3F32BBE7B72B", "versionEndExcluding": "15.2-4", "versionStartIncluding": "15.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Antes de la versi\u00f3n 15.2.99.103 o Tuleap Community Edition y antes de las versiones 15.2-4 y 15.1-8 de Tuleap Enterprise Edition, el nombre de las versiones no aparece correctamente con caracteres de escape en la p\u00e1gina de edici\u00f3n de una versi\u00f3n. Un usuario malintencionado con la capacidad de crear una versi\u00f3n de FRS podr\u00eda obligar a una v\u00edctima que tenga permisos de escritura en FRS a ejecutar c\u00f3digo no controlado. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4 y Tuleap Enterprise Edition 15.1-8 contienen una soluci\u00f3n para este problema." } ], "id": "CVE-2023-48715", "lastModified": "2024-11-21T08:32:19.230", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-11T19:15:08.860", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=35143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=35143" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-29 21:15
Modified
2024-11-21 08:02
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "0C6D58F3-A54E-4B32-93A9-C8D93855586F", "versionEndExcluding": "14.7-7", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "24769828-A1C7-457C-B409-E0BCEE39CBDD", "versionEndExcluding": "14.8.99.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "171202C5-61A2-42C5-9A9E-505E2C29FB6D", "versionEndExcluding": "14.8-3", "versionStartIncluding": "14.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue." }, { "lang": "es", "value": "Tuleap es una herramienta de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En Tuleap Community Edition anterior a la versi\u00f3n 14.8.99.60 y en Tuleap Enterprise Edition anterior a las versiones 14.8-3 y 14.7-7 los registros de las URLs de los trabajos Jenkins desencadenados no se escapan correctamente. Un administrador Git malicioso puede configurar un \"hook\" de Jenkins malicioso para hacer que una v\u00edctima, tambi\u00e9n administrador Git, ejecute c\u00f3digo no controlado. Tuleap Community Edition v14.8.99.60, Tuleap Enterprise Edition v14.8-3 y Tuleap Enterprise Edition v14.7-7 contienen un parche para este problema. " } ], "id": "CVE-2023-32072", "lastModified": "2024-11-21T08:02:39.393", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-29T21:15:09.893", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=31929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=31929" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-18 22:15
Modified
2024-11-21 06:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "E96D40EA-8C9F-4052-9F5E-84F8368AD64B", "versionEndExcluding": "11.17.99.146", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C729636A-A29A-4C71-8AF0-CF531D309B9F", "versionEndExcluding": "11.16-7", "versionStartIncluding": "11.16-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "0B68A044-63C9-493C-B315-E50EB4ECAC1C", "versionEndExcluding": "11.17-5", "versionStartIncluding": "11.17-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." }, { "lang": "es", "value": "Tuleap es una Suite Libre y de C\u00f3digo Abierto para mejorar la administraci\u00f3n de desarrolladores de software y colaboraci\u00f3n. En las versiones afectadas Tuleap no sanea apropiadamente las entradas del usuario cuando construye la consulta SQL para navegar y buscar revisiones en los repositorios CVS. Las siguientes versiones contienen la correcci\u00f3n: Tuleap Community Edition versi\u00f3n 11.17.99.146, Tuleap Enterprise Edition versi\u00f3n 11.17-5, Tuleap Enterprise Edition versi\u00f3n 11.16-7" } ], "id": "CVE-2021-41155", "lastModified": "2024-11-21T06:25:37.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-18T22:15:07.680", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=16214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=16214" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-01 17:15
Modified
2024-11-21 07:03
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "066172DD-53FB-4CD1-9A5D-3BEE64B96187", "versionEndExcluding": "13.10.99.82", "versionStartIncluding": "13.9.9.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "20FB1276-F4A5-4123-B2E5-7220D5A41B25", "versionEndExcluding": "13.10-3", "versionStartIncluding": "13.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para mejorar la administraci\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En las versiones afectadas, Tuleap no verifica correctamente los permisos cuando son creadas ramas con la API REST en repositorios Git usando los permisos de grano fino. Los usuarios pueden crear ramas por medio del endpoint REST \"POST git/:id/branches\" independientemente de los permisos establecidos en el repositorio. Este problema ha sido corregido en la versi\u00f3n 13.10.99.82 de Tuleap Community Edition, as\u00ed como en la versi\u00f3n 13.10-3 de Tuleap Enterprise Edition. Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema" } ], "id": "CVE-2022-31128", "lastModified": "2024-11-21T07:03:57.300", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-01T17:15:08.403", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27538" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-19 11:15
Modified
2024-11-21 07:17
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "6D8CF699-74B7-4FEE-804C-1729780FA0EE", "versionEndExcluding": "14.0.99.24", "versionStartIncluding": "12.9.99.228", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "38FC5DF7-5EF5-4EE8-9B23-539CC0F8E6C9", "versionEndExcluding": "13.12-6", "versionStartIncluding": "12.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B2BBE4EC-1B9E-44C6-A191-A23182941E2B", "versionEndExcluding": "14.0-3", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para mejorar la administraci\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones 12.9.99.228 y superiores, anteriores a 14.0.99.24, las autorizaciones no son verificadas apropiadamente cuando es actualizado el prefijo de la rama usado por la integraci\u00f3n del repositorio GitLab. Los usuarios autenticados pueden cambiar el prefijo de rama de cualquiera de las integraciones de repositorios de GitLab que pueden visualizar mediante el endpoint REST \"PATCH /gitlab_repositories/{id}\". Esta acci\u00f3n deber\u00eda estar restringida a administradores de Git. Este problema est\u00e1 parcheado en Tuleap Community Edition versi\u00f3n 4.0.99.24 y Tuleap Enterprise Edition versi\u00f3n 14.0-3. No son conocidas mitigaciones" } ], "id": "CVE-2022-39233", "lastModified": "2024-11-21T07:17:50.530", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-19T11:15:11.160", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3884-972x-3ccq" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=28848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3884-972x-3ccq" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=28848" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-04 14:15
Modified
2025-01-29 17:15
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "413A17BF-37CE-413F-9FC3-62728A0713F7", "versionEndExcluding": "14.7.99.143", "versionStartIncluding": "14.7.99.76", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.\n" } ], "id": "CVE-2023-30619", "lastModified": "2025-01-29T17:15:25.303", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-04T14:15:11.663", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=31586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=31586" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-24 23:15
Modified
2024-11-21 08:13
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "02978410-E893-4658-8504-4E109A3E791E", "versionEndExcluding": "14.10-6", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "4DB1EBAE-50D3-4D68-B912-589685D5CF2E", "versionEndExcluding": "14.11.99.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F85C9C17-E15B-4042-96B2-0F0F8B7CD6A7", "versionEndExcluding": "14.11-3", "versionStartIncluding": "14.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue." } ], "id": "CVE-2023-38508", "lastModified": "2024-11-21T08:13:43.343", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T23:15:08.803", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=33608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=33608" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" }, { "lang": "en", "value": "CWE-862" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 16:15
Modified
2025-08-21 22:07
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C9A97892-5CD1-4264-BBDE-843B91161A62", "versionEndExcluding": "16.4-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "0913CB7A-B33F-4B9B-9531-F55216FB8CED", "versionEndExcluding": "16.5.99.1742306712", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E08117D5-6EA5-490F-B78D-8EFDE5025837", "versionEndExcluding": "16.5-5", "versionStartIncluding": "16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap carece de protecci\u00f3n CSRF en la administraci\u00f3n de la jerarqu\u00eda de rastreadores. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a las v\u00edctimas y lograr que env\u00eden o editen artefactos o comentarios de seguimiento. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742306712 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "id": "CVE-2025-29929", "lastModified": "2025-08-21T22:07:11.397", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-31T16:15:24.237", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/dce61747f3a169da1f6b585ad5e6e0847fa3c950" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hqqr-p5f6-26vv" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dce61747f3a169da1f6b585ad5e6e0847fa3c950" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=42231" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-22 14:15
Modified
2025-04-10 17:45
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox "Apply same permissions to all sub-items of this folder" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "BAD0BC26-272E-40BA-85A1-76079EFDC305", "versionEndExcluding": "15.9-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "4442E90B-4840-4E66-800A-451533E638E3", "versionEndExcluding": "15.10.99.128", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A33A0CAA-11FD-4A54-8881-3C6C4191F70F", "versionEndExcluding": "15.10-6", "versionStartIncluding": "15.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Antes de Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8, la casilla de verificaci\u00f3n \"Apply same permissions to all sub-items of this folder\" en el modo de permisos del administrador de documentos no se tiene en cuenta y siempre se considera como desmarcada. En situaciones en las que se restringen los permisos, es posible que algunos usuarios a\u00fan mantengan, incorrectamente, la posibilidad de editar o administrar elementos. Solo se ven afectados los cambios realizados a trav\u00e9s de la interfaz de usuario web; los cambios realizados directamente a trav\u00e9s de la API REST no se ven afectados. Esta vulnerabilidad se solucion\u00f3 en Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8." } ], "id": "CVE-2024-39902", "lastModified": "2025-04-10T17:45:08.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-22T14:15:06.383", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-15 20:15
Modified
2024-11-21 06:29
Severity ?
6.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "57E21628-895D-4866-8311-00FEDF3172CF", "versionEndExcluding": "13.2.99.83", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EC827F38-6CE3-4CA7-971D-614DFC80FE33", "versionEndExcluding": "13.1-6", "versionStartIncluding": "13.1-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E9CA970A-6199-4407-8C95-49B36EFE0134", "versionEndExcluding": "13.2-4", "versionStartIncluding": "13.2-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4." }, { "lang": "es", "value": "Tuleap es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Esto es un seguimiento de GHSA-887w-pv2r-x8pm/CVE-2021-41276, la correcci\u00f3n inicial era incompleta. Tuleap no sanea adecuadamente el filtro de b\u00fasqueda construido a partir del atributo ldap_id de un usuario durante la sincronizaci\u00f3n diaria. Un usuario malicioso podr\u00eda forzar la suspensi\u00f3n de cuentas o tomar el control de otra cuenta al forzar la actualizaci\u00f3n del atributo ldap_uid. Ten en cuenta que el usuario malicioso debe tener capacidad de administrador del sitio en la instancia de Tuleap o ser un operador LDAP con capacidad para crear/modificar cuentas. La instancia de Tuleap necesita tener el plugin LDAP activado y habilitado para que este problema sea explotable. Las siguientes versiones contienen la correcci\u00f3n: Tuleap Community Edition versi\u00f3n 13.2.99.83, Tuleap Enterprise Edition versi\u00f3n 13.1-6, y Tuleap Enterprise Edition versi\u00f3n 13.2-4" } ], "id": "CVE-2021-43782", "lastModified": "2024-11-21T06:29:46.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-15T20:15:08.490", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "source": "security-advisories@github.com", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24168" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" }, { "lang": "en", "value": "CWE-90" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-03 16:15
Modified
2025-07-10 16:59
Severity ?
Summary
Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Enalean/tuleap/commit/ef650abb4a28359a3228d6e1102a742f7c013150 | Patch | |
security-advisories@github.com | https://github.com/Enalean/tuleap/security/advisories/GHSA-r85g-9wjx-pw7f | Patch, Vendor Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/tracker/?aid=41849 | Issue Tracking, Vendor Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://tuleap.net/plugins/tracker/?aid=41849 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "CF521B60-B2D9-4E9F-86E0-3BD24A37A51A", "versionEndExcluding": "16.3-9", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "F9E6C851-9EFC-4F96-8EA8-E3D4A2AD07F1", "versionEndExcluding": "16.4.99.1739877910", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A9F89493-457B-4383-8B88-CF966645FCBD", "versionEndExcluding": "16.4-4", "versionStartIncluding": "16.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto dise\u00f1ada para mejorar la gesti\u00f3n y la colaboraci\u00f3n en el desarrollo de software. Un usuario malintencionado con acceso a un rastreador podr\u00eda forzar el restablecimiento de ciertas configuraciones de campo, lo que podr\u00eda provocar una posible p\u00e9rdida de informaci\u00f3n. El atributo de tiempo de visualizaci\u00f3n para el campo de fecha, el atributo de tama\u00f1o para el campo de cuadro de selecci\u00f3n m\u00faltiple, los atributos de valor predeterminado, n\u00famero de filas y columnas para el campo de texto, y los atributos de valor predeterminado, tama\u00f1o y m\u00e1ximo de caracteres para las configuraciones del campo de cadena se pierden cuando se agregan como criterios en un informe guardado. Adem\u00e1s, en las versiones 16.4.99.1739806825 a 16.4.99.1739877910 de Tuleap Community Edition, este problema podr\u00eda aprovecharse para evitar el acceso a los datos del rastreador al provocar un bloqueo. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1739877910 y Tuleap Enterprise Edition 16.3-9 y 16.4-4." } ], "id": "CVE-2025-27094", "lastModified": "2025-07-10T16:59:17.613", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-03-03T16:15:43.023", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/ef650abb4a28359a3228d6e1102a742f7c013150" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-r85g-9wjx-pw7f" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=41849" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=41849" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-440" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-15 20:15
Modified
2024-11-21 06:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "3FD78921-2244-4540-9903-2DACB4EF1452", "versionEndExcluding": "13.2.99.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "0DB8CEB4-390C-4031-8ED5-1B74416D6E77", "versionEndExcluding": "13.1-5", "versionStartIncluding": "13.1-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "43D14ED7-492F-44D1-A69D-D4CACA4869CF", "versionEndExcluding": "13.2-3", "versionStartIncluding": "13.2-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3." }, { "lang": "es", "value": "Tuleap es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En las versiones afectadas Tuleap no sanea correctamente el filtro de b\u00fasqueda construido a partir del atributo ldap_id de un usuario durante la sincronizaci\u00f3n diaria. Un usuario malicioso podr\u00eda forzar la suspensi\u00f3n de cuentas o tomar el control de otra cuenta al forzar la actualizaci\u00f3n del atributo ldap_uid. Tenga en cuenta que el usuario malicioso debe tener capacidad de administrador del sitio en la instancia de Tuleap o ser un operador LDAP con capacidad para crear/modificar cuentas. La instancia de Tuleap necesita tener el plugin LDAP activado y habilitado para que este problema sea explotable. Este problema ha sido parcheado en Tuleap Community Edition versi\u00f3n 13.2.99.31, Tuleap Enterprise Edition versi\u00f3n 13.1-5, y Tuleap Enterprise Edition versi\u00f3n 13.2-3" } ], "id": "CVE-2021-41276", "lastModified": "2024-11-21T06:25:56.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-15T20:15:08.423", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24149" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" }, { "lang": "en", "value": "CWE-90" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-20 17:15
Modified
2024-11-21 07:47
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is a Free & Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1092E5D2-592F-45AE-AAD7-055F42EEBA67", "versionEndExcluding": "14.4-7", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "F4555DF2-D6B6-4CE1-901B-4E886DA794E2", "versionEndExcluding": "14.5.99.4", "versionStartIncluding": "13.8.99.49", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "5E58AAFA-7D70-4AF5-9916-1F43B5286072", "versionEndExcluding": "14.5-2", "versionStartIncluding": "14.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue." } ], "id": "CVE-2023-23938", "lastModified": "2024-11-21T07:47:08.480", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-20T17:15:07.120", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=30734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=30734" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-06 16:15
Modified
2024-11-21 08:57
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Some users might get access to restricted information when a process validates the permissions of multiple users (e.g. mail notifications). This issue has been patched in version 15.4.99.140 of Tuleap Community Edition.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7548F1B9-87A8-41DE-B183-D04F86C48E71", "versionEndExcluding": "15.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "567B7600-1D54-438C-B9B4-D4AF108A3AF7", "versionEndExcluding": "15.4.99.140", "versionStartIncluding": "15.2.99.49", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Some users might get access to restricted information when a process validates the permissions of multiple users (e.g. mail notifications). This issue has been patched in version 15.4.99.140 of Tuleap Community Edition." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Algunos usuarios pueden obtener acceso a informaci\u00f3n restringida cuando un proceso valida los permisos de m\u00faltiples usuarios (por ejemplo, notificaciones por correo). Este problema se solucion\u00f3 en la versi\u00f3n 15.4.99.140 de Tuleap Community Edition." } ], "id": "CVE-2024-23344", "lastModified": "2024-11-21T08:57:33.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-06T16:15:52.120", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=35862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=35862" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-15 14:15
Modified
2024-11-21 06:25
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with admin rights in one agile dashboard service can execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "8B915FD8-6D43-4E50-8969-92697EEF5E27", "versionEndExcluding": "11.16.99.173", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A27A3110-C7F5-4618-A28D-09898CB6608B", "versionEndExcluding": "11.15-8", "versionStartIncluding": "11.15-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "34E67CE9-C542-43FD-B473-D70F96CED515", "versionEndExcluding": "11.16-6", "versionStartIncluding": "11.16-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with admin rights in one agile dashboard service can execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." }, { "lang": "es", "value": "Tuleap Open ALM es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En versiones anteriores a 11.16.99.173 de Community Edition y versiones 11.16-6 y 11.15-8 de Enterprise Edition, un atacante con derechos de administrador en un servicio de tablero \u00e1gil puede ejecutar consultas SQL arbitrarias. Tuleap Community Edition versi\u00f3n 11.16.99.173, Tuleap Enterprise Edition versi\u00f3n 11.16-6 y Tuleap Enterprise Edition versi\u00f3n 11.15-8 contienen un parche para este problema" } ], "id": "CVE-2021-41147", "lastModified": "2024-11-21T06:25:35.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-15T14:15:08.247", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=15131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=15131" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-25 16:15
Modified
2025-08-21 20:53
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a cross-site request forgery vulnerability in Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1749830289 and Tuleap Enterprise Edition 16.9-1 contain a patch for the issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "5E446899-02CD-4C63-9CC5-86B1E707B3A1", "versionEndExcluding": "16.8.99.1749830289", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "1B3AD6C8-20CF-4842-AA39-9B9EEDDEB31C", "versionEndExcluding": "16.9-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a cross-site request forgery vulnerability in Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1749830289 and Tuleap Enterprise Edition 16.9-1 contain a patch for the issue." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Un atacante podr\u00eda aprovechar una vulnerabilidad de cross-site request forgery en Tuleap Community Edition (versi\u00f3n anterior a la 16.8.99.1749830289) y Tuleap Enterprise Edition (versi\u00f3n anterior a la 16.9-1) para enga\u00f1ar a las v\u00edctimas y lograr que modifiquen las respuestas predefinidas. Tuleap Community Edition (versi\u00f3n anterior a la 16.8.99.1749830289) y Tuleap Enterprise Edition (versi\u00f3n anterior a la 16.9-1) incluyen un parche para este problema." } ], "id": "CVE-2025-50179", "lastModified": "2025-08-21T20:53:46.087", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-25T16:15:26.843", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0f9aab6e3640e892c74c9dfc90ad65fd3aff499e" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rxpm-g7gw-4mrv" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0f9aab6e3640e892c74c9dfc90ad65fd3aff499e" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=43357" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 16:15
Modified
2025-08-21 22:09
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission & edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C9A97892-5CD1-4264-BBDE-843B91161A62", "versionEndExcluding": "16.4-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "5A32DF5F-EAE1-49D1-98E9-C2E4BFF908DA", "versionEndExcluding": "16.5.99.1741784483", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "CF3F66CC-0D12-437B-9430-9C00F51BB082", "versionEndExcluding": "16.5-3", "versionStartIncluding": "16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission \u0026 edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap carece de protecci\u00f3n CSRF para el env\u00edo y la edici\u00f3n de artefactos desde la vista del rastreador. Un atacante podr\u00eda usar esta vulnerabilidad para enga\u00f1ar a las v\u00edctimas y lograr que env\u00eden o editen artefactos o comentarios de seguimiento. La vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1741784483 y Tuleap Enterprise Edition 16.5-3 y 16.4-8." } ], "id": "CVE-2025-29766", "lastModified": "2025-08-21T22:09:47.850", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-31T16:15:23.897", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/81f45330fdcc1329cc71eddf4d04b80c340b3b93" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6p9q-p2q4-3rqx" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=81f45330fdcc1329cc71eddf4d04b80c340b3b93" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=42208" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-29 20:15
Modified
2025-08-05 14:19
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3, malicious users with some control over certain artifacts could insert malicious code when displaying the children of a parent artifact to force victims to execute the uncontrolled code. This is fixed in version Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E01F8ECA-7889-4EB9-9964-2E1E3B142847", "versionEndExcluding": "16.8-5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "681D79D9-7B3D-44D7-9A3D-3CC449399F89", "versionEndExcluding": "16.9.99.1751892857", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "EC079AB5-8BFF-4153-B103-1DE823E677BB", "versionEndExcluding": "16.9-3", "versionStartIncluding": "16.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3, malicious users with some control over certain artifacts could insert malicious code when displaying the children of a parent artifact to force victims to execute the uncontrolled code. This is fixed in version Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto creada para facilitar la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. En Tuleap Community Edition anterior a la versi\u00f3n 16.9.99.1751892857 y Tuleap Enterprise Edition anterior a las versiones 16.8-5 y 16.9-3, usuarios maliciosos con cierto control sobre ciertos artefactos pod\u00edan insertar c\u00f3digo malicioso al mostrar los elementos secundarios de un artefacto principal para obligar a las v\u00edctimas a ejecutar el c\u00f3digo no controlado. Esto se ha corregido en Tuleap Community Edition anterior a la versi\u00f3n 16.9.99.1751892857 y Tuleap Enterprise Edition anterior a las versiones 16.8-5 y 16.9-3." } ], "id": "CVE-2025-53541", "lastModified": "2025-08-05T14:19:08.840", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-07-29T20:15:28.500", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "http://github.com/Enalean/tuleap/commit/c1aec8247697d63dc4af791ecd6bd70d105ded08" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6r66-j76j-rwhw" }, { "source": "security-advisories@github.com", "tags": [ "Permissions Required" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c1aec8247697d63dc4af791ecd6bd70d105ded08" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=43693" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=43693" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-21 07:29
Modified
2024-11-21 03:54
Severity ?
Summary
An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "674FD2A7-2A78-432D-99BA-69E99DC9F124", "versionEndExcluding": "10.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password." }, { "lang": "es", "value": "Se ha descubierto un problema en Enalean Tuleap en versiones anteriores a la 10.5. Los enlaces de reinicio de contrase\u00f1a no est\u00e1n validados despu\u00e9s de que el usuario cambie su contrase\u00f1a." } ], "id": "CVE-2018-17298", "lastModified": "2024-11-21T03:54:11.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-21T07:29:00.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=12219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=12219" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-640" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 16:15
Modified
2025-08-21 22:04
Severity ?
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C9A97892-5CD1-4264-BBDE-843B91161A62", "versionEndExcluding": "16.4-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "5A312FB3-6292-40D2-A66F-AA7877CB2433", "versionEndExcluding": "16.5.99.1742392651", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E08117D5-6EA5-490F-B78D-8EFDE5025837", "versionEndExcluding": "16.5-5", "versionStartIncluding": "16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap no exige permisos de lectura a los rastreadores principales en la API REST. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742392651 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "id": "CVE-2025-30155", "lastModified": "2025-08-21T22:04:13.223", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-03-31T16:15:25.187", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0921df3a1c1aa20fc359b373f001a77c43b1b726" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6hr4-h6px-7ppg" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0921df3a1c1aa20fc359b373f001a77c43b1b726" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=42237" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-29 18:15
Modified
2024-11-21 07:03
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "290E08AF-5F26-4777-AD57-9343595B5B75", "versionEndExcluding": "13.9.99.111", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "94F599E8-A949-4624-94D8-2B1AE92AFE64", "versionEndExcluding": "13.8.6", "versionStartIncluding": "13.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "196F5F96-ACA8-4072-A5D7-A54914138D64", "versionEndExcluding": "13.9.3", "versionStartIncluding": "13.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para mejorar la administraci\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones anteriores a 13.9.99.111, el t\u00edtulo de un documento no se escapa apropiadamente en el resultado de la b\u00fasqueda del widget MyDocmanSearch y en la p\u00e1gina de administraci\u00f3n de los documentos bloqueados. Un usuario malicioso con capacidad para crear un documento podr\u00eda forzar a la v\u00edctima a ejecutar c\u00f3digo no controlado. Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema" } ], "id": "CVE-2022-31063", "lastModified": "2024-11-21T07:03:49.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-29T18:15:08.893", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=27173" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-13 07:15
Modified
2024-11-21 07:30
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.104, project level authorizations are not properly verified when accessing the project "homepage"/dashboards. Users not authorized to access a project may still be able to get some information provided by the widgets (e.g. number of members, content of the Notes widget...). This issue has been patched in Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4, and Tuleap Enterprise Edition 14.1-5.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3 | Patch, Third Party Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8 | Patch, Vendor Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/tracker/?aid=29642 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/tracker/?aid=29642 | Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "26D46F9E-A511-453E-9927-EBFF4605777A", "versionEndExcluding": "14.1-5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "4097CC05-EE5F-4A78-8E72-8B0CE825D52E", "versionEndExcluding": "14.2.99.104", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "01FD76C3-5FB5-4AB2-92B5-CA7717FFD4E2", "versionEndExcluding": "14.2-4", "versionStartIncluding": "14.2-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.104, project level authorizations are not properly verified when accessing the project \"homepage\"/dashboards. Users not authorized to access a project may still be able to get some information provided by the widgets (e.g. number of members, content of the Notes widget...). This issue has been patched in Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4, and Tuleap Enterprise Edition 14.1-5. " }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones anteriores a la 14.2.99.104, las autorizaciones a nivel de proyecto no se verifican correctamente al acceder a la \"p\u00e1gina de inicio\"/paneles de control del proyecto. Los usuarios no autorizados para acceder a un proyecto a\u00fan pueden obtener cierta informaci\u00f3n proporcionada por los widgets (por ejemplo, n\u00famero de miembros, contenido del widget de Notas...). Este problema se solucion\u00f3 en Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4 y Tuleap Enterprise Edition 14.1-5." } ], "id": "CVE-2022-46160", "lastModified": "2024-11-21T07:30:13.833", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-13T07:15:13.980", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=29642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=29642" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-25 14:15
Modified
2025-08-21 20:49
Severity ?
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a vulnerability present in Tuleap Community Edition prior to version 16.8.99.1748845907 and Tuleap Enterprise Edition prior to versions 16.8-3 and 16.7-5 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1748845907, Tuleap Enterprise Edition 16.8-3, and Tuleap Enterprise Edition 16.7-5 contain a fix for the vulnerability.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D5501A1C-1E24-4583-992D-097B2493779D", "versionEndExcluding": "16.7-5", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "723BBFA2-E1F2-4E3C-A3D5-F055ED0C9271", "versionEndExcluding": "16.8.99.1748845907", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AF17DD1B-5CC3-4486-A238-336EF67739A4", "versionEndExcluding": "16.8-3", "versionStartIncluding": "16.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a vulnerability present in Tuleap Community Edition prior to version 16.8.99.1748845907 and Tuleap Enterprise Edition prior to versions 16.8-3 and 16.7-5 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1748845907, Tuleap Enterprise Edition 16.8-3, and Tuleap Enterprise Edition 16.7-5 contain a fix for the vulnerability." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Un atacante podr\u00eda aprovechar una vulnerabilidad presente en Tuleap Community Edition anterior a la versi\u00f3n 16.8.99.1748845907 y en Tuleap Enterprise Edition anterior a las versiones 16.8-3 y 16.7-5 para enga\u00f1ar a las v\u00edctimas y lograr que modifiquen las respuestas predefinidas. Tuleap Community Edition 16.8.99.1748845907, Tuleap Enterprise Edition 16.8-3 y Tuleap Enterprise Edition 16.7-5 contienen una correcci\u00f3n para esta vulnerabilidad." } ], "id": "CVE-2025-48991", "lastModified": "2025-08-21T20:49:34.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-25T14:15:24.943", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/cbf9b2a38e33dfd755dc2ccf074126b598a78274" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-px9r-875r-w534" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=cbf9b2a38e33dfd755dc2ccf074126b598a78274" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=43326" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 16:15
Modified
2025-08-21 22:03
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C9A97892-5CD1-4264-BBDE-843B91161A62", "versionEndExcluding": "16.4-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "3D1C190B-9ADD-4E3F-9A43-8ECCE8FB1C94", "versionEndExcluding": "16.5.99.1742562878", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "E08117D5-6EA5-490F-B78D-8EFDE5025837", "versionEndExcluding": "16.5-5", "versionStartIncluding": "16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Tuleap permite el uso de cross-site scripting (XSS) a trav\u00e9s del contenido de las fuentes RSS en los widgets RSS. Un administrador de proyecto o alguien con control sobre una fuente RSS en uso podr\u00eda aprovechar esta vulnerabilidad para obligar a las v\u00edctimas a ejecutar c\u00f3digo no controlado. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742562878 y Tuleap Enterprise Edition 16.5-5 y 16.4-8." } ], "id": "CVE-2025-30203", "lastModified": "2025-08-21T22:03:06.790", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-31T16:15:25.473", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/54cce3f5e883d16055cb0239e023f48cdf5eb25f" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=54cce3f5e883d16055cb0239e023f48cdf5eb25f" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=42243" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-84" } ], "source": "security-advisories@github.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-31 16:15
Modified
2025-08-21 21:59
Severity ?
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "535D4D22-BF61-4A99-8515-E95722AC7103", "versionEndExcluding": "16.4-10", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "867EB5A8-3A1E-4DA7-A21A-872997E02D33", "versionEndExcluding": "16.5.99.1742812323", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "DE29611D-B4AB-456E-9DBE-F17652DECEC6", "versionEndExcluding": "16.5-6", "versionStartIncluding": "16.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto que mejora la gesti\u00f3n del desarrollo de software y la colaboraci\u00f3n. Un atacante puede acceder al contenido o la informaci\u00f3n de las notas de la versi\u00f3n a trav\u00e9s de los endpoints REST de FRS a los que no deber\u00eda tener acceso. Esta vulnerabilidad est\u00e1 corregida en Tuleap Community Edition 16.5.99.1742812323 y Tuleap Enterprise Edition 16.5-6 y 16.4-10." } ], "id": "CVE-2025-30209", "lastModified": "2025-08-21T21:59:27.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-03-31T16:15:25.620", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=34af2d5d10b0349967129f53427f495815e5bbcc" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=42251" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-29 20:15
Modified
2024-11-21 08:09
Severity ?
4.1 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. When switching from a project visibility that allows restricted users to `Private without restricted`, restricted users that are project administrators keep this access right. Restricted users that were project administrators before the visibility switch keep the possibility to access the project and do some administration actions. This issue has been resolved in Tuleap version 14.9.99.63. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "37FD2AC0-3BFA-4755-8696-D2E36ECABC51", "versionEndExcluding": "14.9.99.63", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "20547F0A-68CB-46A2-A86E-C74C95E3E953", "versionEndExcluding": "14.10-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": " Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. When switching from a project visibility that allows restricted users to `Private without restricted`, restricted users that are project administrators keep this access right. Restricted users that were project administrators before the visibility switch keep the possibility to access the project and do some administration actions. This issue has been resolved in Tuleap version 14.9.99.63. Users are advised to upgrade. There are no known workarounds for this issue." } ], "id": "CVE-2023-35938", "lastModified": "2024-11-21T08:09:00.910", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-29T20:15:09.923", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=32278" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=32278" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-18 22:15
Modified
2024-11-21 06:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a "SVN core" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "3772A5E9-DB3F-4862-A561-6E2B9D4657E6", "versionEndExcluding": "11.17.99.144", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "C729636A-A29A-4C71-8AF0-CF531D309B9F", "versionEndExcluding": "11.16-7", "versionStartIncluding": "11.16-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "0B68A044-63C9-493C-B315-E50EB4ECAC1C", "versionEndExcluding": "11.17-5", "versionStartIncluding": "11.17-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a \"SVN core\" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." }, { "lang": "es", "value": "Tuleap es una Suite Libre y de C\u00f3digo Abierto para mejorar la administraci\u00f3n de desarrolladores de software y colaboraci\u00f3n. En las versiones afectadas un atacante con acceso de lectura a un repositorio \"SVN core\" podr\u00eda ejecutar consultas SQL arbitrarias. Las siguientes versiones contienen la correcci\u00f3n: Tuleap Community Edition versi\u00f3n 11.17.99.144, Tuleap Enterprise Edition versi\u00f3n 11.17-5, Tuleap Enterprise Edition versi\u00f3n 11.16-7" } ], "id": "CVE-2021-41154", "lastModified": "2024-11-21T06:25:36.873", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-18T22:15:07.617", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=16213" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=16213" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-12-13 07:15
Modified
2024-11-21 06:48
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.148, Authorizations are not properly verified when accessing MediaWiki standalone resources. Users with read only permissions for pages are able to also edit them. This only affects the MediaWiki standalone plugin. This issue is patched in versions Tuleap Community Edition 14.2.99.148, Tuleap Enterprise Edition 14.2-5, and Tuleap Enterprise Edition 14.1-6.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw | Patch, Third Party Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=97cac78302170a883c1d60c9fa6dfd0d95854cb9 | Patch, Vendor Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/tracker/?aid=29645 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=97cac78302170a883c1d60c9fa6dfd0d95854cb9 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/tracker/?aid=29645 | Issue Tracking, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B83F73F0-4A3C-4BF8-9856-69804CC7CA97", "versionEndExcluding": "14.1-6", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "1D108E69-8674-468E-97F8-43328D59DB3F", "versionEndExcluding": "14.2.99.148", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "58282A9C-CDE2-4A05-A3CC-81CB363A6C33", "versionEndExcluding": "14.2-5", "versionStartIncluding": "14.2-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.148, Authorizations are not properly verified when accessing MediaWiki standalone resources. Users with read only permissions for pages are able to also edit them. This only affects the MediaWiki standalone plugin. This issue is patched in versions Tuleap Community Edition 14.2.99.148, Tuleap Enterprise Edition 14.2-5, and Tuleap Enterprise Edition 14.1-6." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones anteriores a la 14.2.99.148, las autorizaciones no se verifican correctamente al acceder a los recursos independientes de MediaWiki. Los usuarios con permisos de solo lectura para p\u00e1ginas tambi\u00e9n pueden editarlas. Esto s\u00f3lo afecta al complemento independiente de MediaWiki. Este problema se solucion\u00f3 en las versiones Tuleap Community Edition 14.2.99.148, Tuleap Enterprise Edition 14.2-5 y Tuleap Enterprise Edition 14.1-6." } ], "id": "CVE-2022-23473", "lastModified": "2024-11-21T06:48:38.023", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-12-13T07:15:09.723", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=29645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=29645" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-29 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a '<?plugin SyntaxHighlighter syntax="c;id"' line to execute the id command.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md | Exploit, Third Party Advisory | |
cve@mitre.org | https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts | Release Notes, Vendor Advisory | |
cve@mitre.org | https://tuleap.net/plugins/tracker/?aid=10159 | Patch, Vendor Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/41953/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/tracker/?aid=10159 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41953/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
enalean | tuleap | * | |
phpwiki_project | phpwiki | 1.3.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "F58AF6C5-B9F9-42B3-802C-9230354D84FF", "versionEndExcluding": "9.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwiki_project:phpwiki:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "9F33E92C-2E8D-44E1-AE74-11DE029B30FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a \u0027\u003c?plugin SyntaxHighlighter syntax=\"c;id\"\u0027 line to execute the id command." }, { "lang": "es", "value": "Tuleap en versiones anteriores a 9.7 permite la inyecci\u00f3n de comandos a trav\u00e9s del plugin PhpWiki 1.3.10 SyntaxHighlighter. Esto ocurre en el componente Project Wiki porque la funci\u00f3n PHP de proc_open se usa dentro de PhpWiki antes de la version 1.5.5 con un valor de sintaxis en su primer argumento y un usuario Tuleap autenticado puede controlar este valor, incluso con los metacaracteres de shell, como lo demuestra una l\u00ednea \u0027" } ], "id": "CVE-2017-7981", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-29T16:59:00.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=10159" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41953/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=10159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41953/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-04 15:55
Modified
2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in Enalean Tuleap before 7.5.99.4 allows remote authenticated users to execute arbitrary SQL commands via the lobal_txt parameter to plugins/docman.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "83974F28-2C88-47FA-839B-63FAE28B29A9", "versionEndIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Enalean Tuleap before 7.5.99.4 allows remote authenticated users to execute arbitrary SQL commands via the lobal_txt parameter to plugins/docman." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en Enalean Tuleap en versiones anteriores a 7.5.99.4 permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro lobal_txt en plugins/docman." } ], "id": "CVE-2014-7176", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-04T15:55:06.137", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/119" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35098" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/70773" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/70773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-10-31 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "93C4A066-647F-469C-B70B-39D77387DFC9", "versionEndIncluding": "7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/." }, { "lang": "es", "value": "Vulnerabilidad de entidad externa XML en Enalean Tuleap 7.2 y anteriores permite a usuarios remotos autenticados leer ficheros arbitrarios a trav\u00e9s de un documento xml manipulado en una acci\u00f3n create en plugins/tracker/." } ], "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/611.html\" target=\"_blank\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e", "id": "CVE-2014-7177", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-31T14:55:05.783", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/120" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/113680" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/70771" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308" }, { "source": "cve@mitre.org", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=7458" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/113680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=7458" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-14 18:15
Modified
2024-10-17 13:48
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7BB42325-937B-4940-9E68-983BA7A1BDD9", "versionEndExcluding": "15.12-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "CBE37DC9-8561-48FE-BC75-5624DE2309EB", "versionEndExcluding": "15.13.99.110", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "49A386EB-18D7-4F4B-A8B9-C26C997C2CDF", "versionEndExcluding": "15.13-5", "versionStartIncluding": "15.13-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." }, { "lang": "es", "value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Antes de Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5 y Tuleap Enterprise Edition 15.12-5, los administradores de un proyecto pueden acceder al contenido de los rastreadores con restricciones de permisos del proyecto del que son miembros pero no administradores a trav\u00e9s del widget de b\u00fasqueda de rastreadores cruzados. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5 y Tuleap Enterprise Edition 15.12-8 solucionan este problema." } ], "id": "CVE-2024-47766", "lastModified": "2024-10-17T13:48:40.240", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T18:15:04.387", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=529d11b70796589767dd27a40ebadf3eaf8f5674" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=39736" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-14 16:15
Modified
2024-11-21 06:25
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "E96D40EA-8C9F-4052-9F5E-84F8368AD64B", "versionEndExcluding": "11.17.99.146", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A58EE8FC-2459-40EF-8991-360390118C6E", "versionEndExcluding": "12.11-2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue." }, { "lang": "es", "value": "Tuleap Open ALM es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Se presenta una vulnerabilidad de tipo cross-site scripting en Tuleap Community Edition versiones anteriores a 12.11.99.25 y Tuleap Enterprise Edition versi\u00f3n 12.11-2. Un usuario malicioso con capacidad para a\u00f1adir y eliminar archivos adjuntos a un artefacto podr\u00eda forzar a la v\u00edctima a ejecutar c\u00f3digo no controlado. Tuleap Community Edition 11.17.99.146 y Tuleap Enterprise Edition 12.11-2 contienen una correcci\u00f3n del problema" } ], "id": "CVE-2021-41142", "lastModified": "2024-11-21T06:25:34.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-14T16:15:09.617", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=22570" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=22570" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-15 20:15
Modified
2024-11-21 06:29
Severity ?
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "DA4C134F-B28D-4009-91B1-43C9B908D698", "versionEndExcluding": "13.2.99.155", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "391F50C0-C8BC-4F96-B1D0-E6242F6BBB2E", "versionEndExcluding": "13.1-7", "versionStartIncluding": "13.1-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "98DD6F86-A298-4E2A-B4C2-65E11A70FA3B", "versionEndExcluding": "13.2-6", "versionStartIncluding": "13.2-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6." }, { "lang": "es", "value": "Tuleap es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En las versiones afectadas, Tuleap no sanea correctamente la configuraci\u00f3n del usuario cuando construye la consulta SQL para navegar y buscar commits en los repositorios CVS. Un usuario malicioso autenticado con acceso de lectura a un repositorio CVS podr\u00eda ejecutar consultas SQL arbitrarias. Las instancias de Tuleap sin repositorios CVS activos no est\u00e1n afectadas. Las siguientes versiones contienen la correcci\u00f3n: Tuleap Community Edition versi\u00f3n 13.2.99.155, Tuleap Enterprise Edition versi\u00f3n 13.1-7, y Tuleap Enterprise Edition versi\u00f3n 13.2-6" } ], "id": "CVE-2021-43806", "lastModified": "2024-11-21T06:29:49.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2021-12-15T20:15:08.557", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=24202" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-03-29 16:15
Modified
2025-07-10 17:13
Severity ?
7.6 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "7ABA9252-EF9D-4BD2-98DB-4FCF5B2037B7", "versionEndExcluding": "15.7.99.6", "versionStartIncluding": "14.11.99.34 ", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "ACE0DEB1-102A-44EE-8217-E1D489080FAF", "versionEndExcluding": "14.12-6", "versionStartIncluding": "14.12-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "BB5542D6-16D4-407A-BCFC-32C96219F20E", "versionEndExcluding": "15.0-9", "versionStartIncluding": "15.0-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "FA862976-6285-4A88-8D47-66AA341405EB", "versionEndExcluding": "15.1-9", "versionStartIncluding": "15.1-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "2AE18296-FDFC-4A94-A245-35A98637A151", "versionEndExcluding": "15.2-5", "versionStartIncluding": "15.2-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AF0788F9-2729-418B-8761-843325A40FF7", "versionEndExcluding": "15.3-6", "versionStartIncluding": "15.3-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7AADD7EC-A8D9-4202-848C-AAA5B0F37CC5", "versionEndExcluding": "15.4-8", "versionStartIncluding": "15.4-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "4BD949BE-FE7B-46F6-8E31-C4ACDF6EE508", "versionEndExcluding": "15.5-6", "versionStartIncluding": "15.5-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "180691C4-B2E2-4387-9AB5-8A8678A984AE", "versionEndExcluding": "15.6-5", "versionStartIncluding": "15.6-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:15.7-1:*:*:*:enterprise:*:*:*", "matchCriteriaId": "791E4104-6EB7-409D-9BF3-08D6AEFCFEEC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Un usuario malintencionado podr\u00eda aprovechar este problema a prop\u00f3sito para eliminar informaci\u00f3n de la instancia o posiblemente obtener acceso a artefactos restringidos. Sin embargo, no es posible controlar exactamente qu\u00e9 informaci\u00f3n se elimina. La informaci\u00f3n de los campos Fecha, Archivo, Flotante, Int, Lista, Lista abierta, Texto y Permisos en artefactos (este puede conducir a la divulgaci\u00f3n de informaci\u00f3n restringida) puede verse afectada. Esta vulnerabilidad se solucion\u00f3 en Tuleap Community Edition versi\u00f3n 15.7.99.6 y Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9 y 14.12. -6." } ], "id": "CVE-2024-30246", "lastModified": "2025-07-10T17:13:14.807", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-03-29T16:15:08.860", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj" }, { "source": "security-advisories@github.com", "tags": [ "Permissions Required" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=37545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=37545" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-440" }, { "lang": "en", "value": "CWE-670" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-24 23:15
Modified
2024-11-21 08:15
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B389AA50-C75A-4B78-B851-FBA97B259588", "versionEndExcluding": "14.10-7", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "FD2D29AB-3C3B-48B8-9D31-4FEC548C9012", "versionEndExcluding": "14.11.99.82", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "2DD0E14B-C944-4B34-BDAF-AD8C374ABC1C", "versionEndExcluding": "14.11-5", "versionStartIncluding": "14.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue." } ], "id": "CVE-2023-39521", "lastModified": "2024-11-21T08:15:35.613", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-24T23:15:09.000", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=33656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=33656" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-22 19:15
Modified
2025-02-05 21:55
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.5.99.76 of Tuleap Community Edition and prior to versions 15.5-4 and 15.4-7 of Tuleap Enterprise Edition, users with a read access to a tracker where the mass update feature is used might get access to restricted information. Tuleap Community Edition 15.5.99.76, Tuleap Enterprise Edition 15.5-4, and Tuleap Enterprise Edition 15.4-7 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "00C1AA2F-2986-49C6-A558-A479543600CB", "versionEndExcluding": "15.4-7", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "BE65762A-F5B7-451D-B081-9424FE3A4FE9", "versionEndExcluding": "15.5.99.76", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "8DA2EE66-8C5E-4E15-903E-3DE016F5207A", "versionEndExcluding": "15.5-4", "versionStartIncluding": "15.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.5.99.76 of Tuleap Community Edition and prior to versions 15.5-4 and 15.4-7 of Tuleap Enterprise Edition, users with a read access to a tracker where the mass update feature is used might get access to restricted information. Tuleap Community Edition 15.5.99.76, Tuleap Enterprise Edition 15.5-4, and Tuleap Enterprise Edition 15.4-7 contain a patch for this issue." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Antes de la versi\u00f3n 15.5.99.76 de Tuleap Community Edition y antes de las versiones 15.5-4 y 15.4-7 de Tuleap Enterprise Edition, los usuarios con acceso de lectura a un rastreador donde se utiliza la funci\u00f3n de actualizaci\u00f3n masiva pod\u00edan obtener acceso a informaci\u00f3n restringida. Tuleap Community Edition 15.5.99.76, Tuleap Enterprise Edition 15.5-4 y Tuleap Enterprise Edition 15.4-7 contienen un parche para este problema." } ], "id": "CVE-2024-25130", "lastModified": "2025-02-05T21:55:35.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-22T19:15:08.823", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=36803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=36803" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-14 18:15
Modified
2024-10-17 13:50
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7BB42325-937B-4940-9E68-983BA7A1BDD9", "versionEndExcluding": "15.12-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "55143981-8C28-4EE7-8593-F1A503C9C8EC", "versionEndExcluding": "15.13.99.113", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "49A386EB-18D7-4F4B-A8B9-C26C997C2CDF", "versionEndExcluding": "15.13-5", "versionStartIncluding": "15.13-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." }, { "lang": "es", "value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En versiones anteriores a Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5 y Tuleap Enterprise Edition 15.12-5, los usuarios pod\u00edan ver nombres de rastreadores a los que no deber\u00edan tener acceso. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5 y Tuleap Enterprise Edition 15.12-8 solucionan este problema." } ], "id": "CVE-2024-47767", "lastModified": "2024-10-17T13:50:45.307", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T18:15:04.593", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=16d9efccb2fad8e10343be2604e94c9058ef2c89" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=e5ce81279766115dc0f126a11d6b5065b5db7eec" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=39728" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-02 01:59
Modified
2025-04-12 10:46
Severity ?
Summary
project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "E87E491B-DC39-4123-AB0F-B9F190278A70", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter." }, { "lang": "es", "value": "project/register.php en Tuleap anterior a 7.7, cuando sys_create_project_in_one_step est\u00e1 deshabilitado, permite a usuarios remotos autenticados realizar ataques de inyecci\u00f3n de objetos PHP y ejecutar c\u00f3digo PHP arbitrario a trav\u00e9s del par\u00e1metro data." } ], "id": "CVE-2014-8791", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-02T01:59:05.887", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://karmainsecurity.com/KIS-2014-13" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/101" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/71335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://karmainsecurity.com/KIS-2014-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/71335" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-29 18:15
Modified
2024-11-21 07:03
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "290E08AF-5F26-4777-AD57-9343595B5B75", "versionEndExcluding": "13.9.99.111", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "94F599E8-A949-4624-94D8-2B1AE92AFE64", "versionEndExcluding": "13.8.6", "versionStartIncluding": "13.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "196F5F96-ACA8-4072-A5D7-A54914138D64", "versionEndExcluding": "13.9.3", "versionStartIncluding": "13.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue." }, { "lang": "es", "value": "Tuleap es una suite libre y de c\u00f3digo abierto para mejorar la administraci\u00f3n de los desarrollos de software y la colaboraci\u00f3n. En versiones anteriores a 13.9.99.58, las autorizaciones no son verificadas apropiadamente cuando son creados proyectos o trackers a partir de proyectos marcados como plantillas. Los usuarios pueden acceder a la informaci\u00f3n de esos proyectos de plantilla porque el modelo de permisos no es aplicado apropiadamente. Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema" } ], "id": "CVE-2022-31032", "lastModified": "2024-11-21T07:03:45.143", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-29T18:15:08.633", "references": [ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=26816" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=26816" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-14 18:15
Modified
2024-10-16 14:07
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
5.7 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw | Third Party Advisory | |
security-advisories@github.com | https://tuleap.net/plugins/tracker/?aid=39686 | Exploit, Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "28A2E98A-A185-4019-B306-C439838FA151", "versionEndExcluding": "15.12-6", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "0F733ED0-CBE0-45C8-BA33-32B5803351CE", "versionEndExcluding": "15.13.99.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F685DF7C-1CA2-449B-84D5-7E8583E9958F", "versionEndExcluding": "15.13-3", "versionStartIncluding": "15.13-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." }, { "lang": "es", "value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Antes de Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6, los usuarios pod\u00edan recibir notificaciones por correo electr\u00f3nico con informaci\u00f3n a la que no deber\u00edan tener acceso. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6 solucionan este problema." } ], "id": "CVE-2024-46988", "lastModified": "2024-10-16T14:07:32.890", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T18:15:04.173", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=39686" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-280" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-01 23:29
Modified
2024-11-21 04:12
Severity ?
Summary
An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:9.17:*:*:*:*:*:*:*", "matchCriteriaId": "D788FEE9-7E6B-48C7-A867-D29BDCA98ADF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover." }, { "lang": "es", "value": "Se ha descubierto un problema en Enalean Tuleap 9.17. La falta de mitigaci\u00f3n de ataques Cross-Site Request Forgery (CSRF) al cambiar una direcci\u00f3n de email posibilita que los atacantes puedan abusar de la funcionalidad. Mediante la realizaci\u00f3n de un ataque de CSRF, un atacante podr\u00eda hacer que una v\u00edctima cambie su direcci\u00f3n de email registrada en la aplicaci\u00f3n, lo que conduce a la toma de control de la cuenta." } ], "id": "CVE-2018-7634", "lastModified": "2024-11-21T04:12:26.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-01T23:29:00.607", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-15 14:15
Modified
2024-11-21 06:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with the ability to add one the CI widget to its personal dashboard could execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "8B915FD8-6D43-4E50-8969-92697EEF5E27", "versionEndExcluding": "11.16.99.173", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A27A3110-C7F5-4618-A28D-09898CB6608B", "versionEndExcluding": "11.15-8", "versionStartIncluding": "11.15-1", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "34E67CE9-C542-43FD-B473-D70F96CED515", "versionEndExcluding": "11.16-6", "versionStartIncluding": "11.16-1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with the ability to add one the CI widget to its personal dashboard could execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." }, { "lang": "es", "value": "Tuleap Open ALM es una herramienta libre y de c\u00f3digo abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. En versiones anteriores a 11.16.99.173 de Community Edition y versiones 11.16-6 y 11.15-8 de Enterprise Edition, un atacante con la capacidad de a\u00f1adir un widget de CI a su tablero personal pod\u00eda ejecutar consultas SQL arbitrarias. Tuleap Community Edition versi\u00f3n 11.16.99.173, Tuleap Enterprise Edition versi\u00f3n 11.16-6 y Tuleap Enterprise Edition versi\u00f3n 11.15-8 contienen un parche para este problema" } ], "id": "CVE-2021-41148", "lastModified": "2024-11-21T06:25:35.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-15T14:15:08.307", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=15028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=15028" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-28 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "879451EA-4EDE-4BB5-A05A-E7AD43EFA609", "versionEndIncluding": "7.5.99.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function." }, { "lang": "es", "value": "Enalean Tuleap anterior a 7.5.99.6 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de la cabecera User-Agent, la cual est\u00e1 proporcionada en la funci\u00f3n passthru PHP." } ], "id": "CVE-2014-7178", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-28T15:59:00.090", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/121" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.tuleap.org/recent-vulnerabilities" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-14 18:15
Modified
2024-10-16 14:05
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "28A2E98A-A185-4019-B306-C439838FA151", "versionEndExcluding": "15.12-6", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "25160A21-0C61-41A4-95C4-6632A50260A9", "versionEndExcluding": "15.13.99.37", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F685DF7C-1CA2-449B-84D5-7E8583E9958F", "versionEndExcluding": "15.13-3", "versionStartIncluding": "15.13-0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." }, { "lang": "es", "value": "Tuleap es una herramienta para la trazabilidad de extremo a extremo de desarrollos de aplicaciones y sistemas. Antes de Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6, un administrador de sitio pod\u00eda crear un tipo de enlace de artefacto con una etiqueta de reenv\u00edo que le permitiera ejecutar c\u00f3digo no controlado (o al menos lograr la inyecci\u00f3n de contenido) en un cliente de correo. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3 y Tuleap Enterprise Edition 15.12-6 solucionan este problema." } ], "id": "CVE-2024-46980", "lastModified": "2024-10-16T14:05:27.090", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-14T18:15:03.947", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dd94a799982cd78ab06142008d745edf9e8fd494" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=39689" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-03 16:15
Modified
2025-07-10 16:48
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Enalean/tuleap/commit/bec10bd5c98f6570a2857f55e9656eec4b211e6c | Patch | |
security-advisories@github.com | https://github.com/Enalean/tuleap/security/advisories/GHSA-vqfj-2gqp-g89x | Vendor Advisory, Patch | |
security-advisories@github.com | https://tuleap.net/plugins/tracker/?aid=41858 | Issue Tracking, Vendor Advisory, Exploit | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://tuleap.net/plugins/tracker/?aid=41858 | Issue Tracking, Vendor Advisory, Exploit |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "852E1CB5-73FD-4A1D-B648-AB9A4FF4C847", "versionEndExcluding": "16.3-10", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "107EC060-A5A8-4474-AFB6-ED4BE5AAB53C", "versionEndExcluding": "16.4.99.1740067916", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "D0383FF5-E7F4-40B0-B455-84F887CDB0C7", "versionEndExcluding": "16.4-5", "versionStartIncluding": "16.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Tuleap permite la ejecuci\u00f3n de cross-site scripting (XSS) a trav\u00e9s de los nombres de los rastreadores utilizados en el mensaje de eliminaci\u00f3n del marco temporal sem\u00e1ntico. Un administrador de rastreadores con un marco temporal sem\u00e1ntico utilizado por otros rastreadores podr\u00eda utilizar esta vulnerabilidad para obligar a otros administradores de rastreadores a ejecutar c\u00f3digo no controlado. Esta vulnerabilidad se ha corregido en Tuleap Community Edition 16.4.99.1740067916 y Tuleap Enterprise Edition 16.4-5 y 16.3-10." } ], "id": "CVE-2025-27099", "lastModified": "2025-07-10T16:48:42.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-03-03T16:15:43.173", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/bec10bd5c98f6570a2857f55e9656eec4b211e6c" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory", "Patch" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-vqfj-2gqp-g89x" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Vendor Advisory", "Exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=41858" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Issue Tracking", "Vendor Advisory", "Exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=41858" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-80" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-10-30 14:29
Modified
2025-04-20 01:37
Severity ?
Summary
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD98D768-7810-4483-BFBA-FCB7D9CBF67D", "versionEndIncluding": "9.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution)." }, { "lang": "es", "value": "Se ha descubierto un problema en Enalean Tuleap en versiones 9.6 y anteriores. La vulnerabilidad existe debido a que el m\u00e9todo User::getRecentElements() est\u00e1 empleando la funci\u00f3n unserialize() con un valor de preferencia que puede ser manipulado de forma arbitraria por usuarios maliciosos mediante la interfaz REST de API. Esto puede ser explotado para inyectar objetos PHP arbitrarios en el \u00e1mbito de la aplicaci\u00f3n, lo que permite que un atacante realice una serie de ataques (incluyendo, pero no limitados a la ejecuci\u00f3n remota de c\u00f3digo)." } ], "id": "CVE-2017-7411", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-30T14:29:00.877", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://karmainsecurity.com/KIS-2017-02" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Oct/53" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/10/23/3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=10118" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/43374/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://karmainsecurity.com/KIS-2017-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Oct/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/10/23/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=10118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/43374/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-12 21:29
Modified
2024-11-21 04:12
Severity ?
Summary
A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Mar/20 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | https://github.com/cmaruti/reports/blob/master/tuleap.pdf | Exploit, Third Party Advisory | |
cve@mitre.org | https://tuleap.net/plugins/tracker/?aid=11192 | Issue Tracking, Patch, Vendor Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/44286/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Mar/20 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/cmaruti/reports/blob/master/tuleap.pdf | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tuleap.net/plugins/tracker/?aid=11192 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44286/ | Exploit, Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1400A3E-39C7-4ED9-817A-57FB3DC11D24", "versionEndExcluding": "9.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n SQL en la funcionalidad tracker de la plataforma de ingenier\u00eda de software Enalean Tuleap, en versiones anteriores a la 9.18, permite que atacantes ejecuten comandos SQL arbitrarios." } ], "id": "CVE-2018-7538", "lastModified": "2024-11-21T04:12:19.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-12T21:29:01.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/20" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=11192" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44286/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=11192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44286/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2023-32072 (GCVE-0-2023-32072)
Vulnerability from cvelistv5
Published
2023-05-29 20:00
Modified
2025-01-13 21:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:03:28.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq" }, { "name": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5" }, { "name": "https://tuleap.net/plugins/tracker/?aid=31929", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=31929" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-13T21:01:15.790947Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-13T21:01:27.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Community Edition \u003c 14.8.99.60" }, { "status": "affected", "version": "Enterprise Edition \u003e= 14.8, \u003c 14.8-3" }, { "status": "affected", "version": "Enterprise Edition \u003c 14.7-7" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-29T20:00:42.622Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq" }, { "name": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=6840529def97f564844e810e5a7c5bf837cf58d5" }, { "name": "https://tuleap.net/plugins/tracker/?aid=31929", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=31929" } ], "source": { "advisory": "GHSA-6prc-j58r-fmjq", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable toXSS via the triggered job URL of a Jenkins job" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32072", "datePublished": "2023-05-29T20:00:42.622Z", "dateReserved": "2023-05-01T16:47:35.315Z", "dateUpdated": "2025-01-13T21:01:27.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41147 (GCVE-0-2021-41147)
Vulnerability from cvelistv5
Published
2021-10-15 14:05
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with admin rights in one agile dashboard service can execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.631Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=15131" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 11.16.99.173" }, { "status": "affected", "version": "\u003e= 11.16-1, \u003c 11.16-6" }, { "status": "affected", "version": "\u003e= 11.15-1, \u003c 11.15-8" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with admin rights in one agile dashboard service can execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-15T14:05:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=15131" } ], "source": { "advisory": "GHSA-j2mq-65wv-prmp", "discovery": "UNKNOWN" }, "title": "SQL injection in the planning edition panel", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41147", "STATE": "PUBLIC", "TITLE": "SQL injection in the planning edition panel" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 11.16.99.173" }, { "version_value": "\u003e= 11.16-1, \u003c 11.16-6" }, { "version_value": "\u003e= 11.15-1, \u003c 11.15-8" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with admin rights in one agile dashboard service can execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j2mq-65wv-prmp" }, { "name": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6b2f8b8c5098938bc094726a4826479ddbee941" }, { "name": "https://tuleap.net/plugins/tracker/?aid=15131", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=15131" } ] }, "source": { "advisory": "GHSA-j2mq-65wv-prmp", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41147", "datePublished": "2021-10-15T14:05:13", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.631Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-29766 (GCVE-0-2025-29766)
Vulnerability from cvelistv5
Published
2025-03-31 15:38
Modified
2025-03-31 18:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission & edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29766", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:12:43.418473Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:36:27.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.5.99.1741784483" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap has missing CSRF protections on artifact submission \u0026 edition from the tracker view. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. The vulnerability is fixed in Tuleap Community Edition 16.5.99.1741784483 and Tuleap Enterprise Edition 16.5-3 and 16.4-8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T15:38:00.273Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6p9q-p2q4-3rqx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6p9q-p2q4-3rqx" }, { "name": "https://github.com/Enalean/tuleap/commit/81f45330fdcc1329cc71eddf4d04b80c340b3b93", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/81f45330fdcc1329cc71eddf4d04b80c340b3b93" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=81f45330fdcc1329cc71eddf4d04b80c340b3b93", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=81f45330fdcc1329cc71eddf4d04b80c340b3b93" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42208", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42208" } ], "source": { "advisory": "GHSA-6p9q-p2q4-3rqx", "discovery": "UNKNOWN" }, "title": "Tuleap has missing CSRF protections on artifact submission \u0026 edition from the tracker view" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29766", "datePublished": "2025-03-31T15:38:00.273Z", "dateReserved": "2025-03-11T14:23:00.473Z", "dateUpdated": "2025-03-31T18:36:27.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-52899 (GCVE-0-2025-52899)
Vulnerability from cvelistv5
Published
2025-07-29 19:16
Modified
2025-07-29 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-204 - Observable Response Discrepancy
Summary
Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1750843170 and Tuleap Enterprise Edition prior to 16.8-4 and 16.9-2, the forgot password form allows for user enumeration. This is fixed in Tuleap Community Edition version 16.9.99.1750843170 and Tuleap Enterprise Edition 16.8-4 and 16.9-2.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-52899", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T19:34:14.816068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:34:26.472Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 16.9.99.1750843170" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 16.9, \u003c 16.9-2" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 16.8-4" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1750843170 and Tuleap Enterprise Edition prior to 16.8-4 and 16.9-2, the forgot password form allows for user enumeration. This is fixed in Tuleap Community Edition version 16.9.99.1750843170 and Tuleap Enterprise Edition 16.8-4 and 16.9-2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-204", "description": "CWE-204: Observable Response Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:16:35.977Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xqf3-xxxf-x3c2", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xqf3-xxxf-x3c2" }, { "name": "https://github.com/Enalean/tuleap/commit/5c72d6d253016d38ed472eb7918f772d074ddb07", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/5c72d6d253016d38ed472eb7918f772d074ddb07" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=5c72d6d253016d38ed472eb7918f772d074ddb07", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=5c72d6d253016d38ed472eb7918f772d074ddb07" }, { "name": "https://tuleap.net/plugins/tracker/?aid=43674", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=43674" } ], "source": { "advisory": "GHSA-xqf3-xxxf-x3c2", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable to user enumeration via the lost password form" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-52899", "datePublished": "2025-07-29T19:16:35.977Z", "dateReserved": "2025-06-20T17:42:25.710Z", "dateUpdated": "2025-07-29T19:34:26.472Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24896 (GCVE-0-2022-24896)
Vulnerability from cvelistv5
Published
2022-06-06 19:30
Modified
2025-04-23 18:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:29:00.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=26729" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-24896", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:06:05.852732Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:19:16.848Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.7.99.239" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-06T19:30:15.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=26729" } ], "source": { "advisory": "GHSA-x962-x43g-qw39", "discovery": "UNKNOWN" }, "title": "Tracker report renderer and chart widgets leak information in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24896", "STATE": "PUBLIC", "TITLE": "Tracker report renderer and chart widgets leak information in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.7.99.239" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x962-x43g-qw39" }, { "name": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=8e99e7c82d9fe569799019b9e1d614d38a184313" }, { "name": "https://tuleap.net/plugins/tracker/?aid=26729", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=26729" } ] }, "source": { "advisory": "GHSA-x962-x43g-qw39", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24896", "datePublished": "2022-06-06T19:30:15.000Z", "dateReserved": "2022-02-10T00:00:00.000Z", "dateUpdated": "2025-04-23T18:19:16.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53902 (GCVE-0-2025-53902)
Vulnerability from cvelistv5
Published
2025-07-29 19:36
Modified
2025-07-29 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1752585665 and Tuleap Enterprise Edition prior to 16.8-6 and 16.9-5, users may potentially access confidential information from artifacts that they are not authorized to view. This is fixed in Tuleap Community Edition prior to version 16.9.99.1752585665 and Tuleap Enterprise Edition prior to 16.8-6 and 16.9-5.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53902", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T19:41:37.859082Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:41:49.056Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 16.9.99.1752585665" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 16.8-6" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 16.9, \u003c 16.9-5" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1752585665 and Tuleap Enterprise Edition prior to 16.8-6 and 16.9-5, users may potentially access confidential information from artifacts that they are not authorized to view. This is fixed in Tuleap Community Edition prior to version 16.9.99.1752585665 and Tuleap Enterprise Edition prior to 16.8-6 and 16.9-5." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:36:10.910Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6f24-5v47-rj6j", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6f24-5v47-rj6j" }, { "name": "https://github.com/Enalean/tuleap/commit/ebe054df8a2672afee41af84e5ba14b57ef8b789", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ebe054df8a2672afee41af84e5ba14b57ef8b789" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ebe054df8a2672afee41af84e5ba14b57ef8b789", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ebe054df8a2672afee41af84e5ba14b57ef8b789" }, { "name": "https://tuleap.net/plugins/tracker/?aid=43704", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=43704" } ], "source": { "advisory": "GHSA-6f24-5v47-rj6j", "discovery": "UNKNOWN" }, "title": "Tuleap exposes artifacts to a mentioned user via email notifications" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53902", "datePublished": "2025-07-29T19:36:10.910Z", "dateReserved": "2025-07-11T19:05:23.826Z", "dateUpdated": "2025-07-29T19:41:49.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27094 (GCVE-0-2025-27094)
Vulnerability from cvelistv5
Published
2025-03-03 15:51
Modified
2025-03-03 16:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-440 - Expected Behavior Violation
Summary
Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27094", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T16:50:55.529164Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T16:51:02.581Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=41849" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1739877910" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open-source suite designed to improve software development management and collaboration. A malicious user with access to a tracker could force-reset certain field configurations, leading to potential information loss. The display time attribute for the date field, the size attribute for the multiselectbox field, the default value, number of rows, and columns attributes for the text field, and the default value, size, and max characters attributes for the string field configurations are lost when added as criteria in a saved report. Additionally, in Tuleap Community Edition versions 16.4.99.1739806825 to 16.4.99.1739877910, this issue could be exploited to prevent access to tracker data by triggering a crash. This vulnerability has been fixed in Tuleap Community Edition 16.4.99.1739877910 and Tuleap Enterprise Edition 16.3-9 and 16.4-4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440: Expected Behavior Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-03T15:51:01.904Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-r85g-9wjx-pw7f", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-r85g-9wjx-pw7f" }, { "name": "https://github.com/Enalean/tuleap/commit/ef650abb4a28359a3228d6e1102a742f7c013150", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ef650abb4a28359a3228d6e1102a742f7c013150" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41849", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41849" } ], "source": { "advisory": "GHSA-r85g-9wjx-pw7f", "discovery": "UNKNOWN" }, "title": "Tuleap allows default values to be cleared from field configuration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27094", "datePublished": "2025-03-03T15:51:01.904Z", "dateReserved": "2025-02-18T16:44:48.764Z", "dateUpdated": "2025-03-03T16:51:02.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7981 (GCVE-0-2017-7981)
Vulnerability from cvelistv5
Published
2017-04-29 16:00
Modified
2024-08-05 16:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a '<?plugin SyntaxHighlighter syntax="c;id"' line to execute the id command.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=10159" }, { "name": "41953", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41953/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a \u0027\u003c?plugin SyntaxHighlighter syntax=\"c;id\"\u0027 line to execute the id command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-15T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=10159" }, { "name": "41953", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41953/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7981", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap before 9.7 allows command injection via the PhpWiki 1.3.10 SyntaxHighlighter plugin. This occurs in the Project Wiki component because the proc_open PHP function is used within PhpWiki before 1.5.5 with a syntax value in its first argument, and an authenticated Tuleap user can control this value, even with shell metacharacters, as demonstrated by a \u0027\u003c?plugin SyntaxHighlighter syntax=\"c;id\"\u0027 line to execute the id command." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts", "refsource": "MISC", "url": "https://tuleap.net/file/shownotes.php?release_id=137#/linked-artifacts" }, { "name": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md", "refsource": "MISC", "url": "https://github.com/xdrr/vulnerability-research/blob/master/webapp/tuleap/2017.04.tuleap-auth-ci.md" }, { "name": "https://tuleap.net/plugins/tracker/?aid=10159", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=10159" }, { "name": "41953", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41953/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7981", "datePublished": "2017-04-29T16:00:00", "dateReserved": "2017-04-20T00:00:00", "dateUpdated": "2024-08-05T16:19:29.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-35929 (GCVE-0-2023-35929)
Vulnerability from cvelistv5
Published
2023-07-25 17:30
Modified
2024-10-23 19:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:41.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268" }, { "name": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "name": "https://tuleap.net/plugins/tracker/?aid=32629", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=32629" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35929", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T19:56:29.979610Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T19:56:54.825Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 14.10.99.4" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 14.9-5" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 14.10, \u003c 14.10-2" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-25T17:30:22.017Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268" }, { "name": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0b2945fbd260d37aa0aff2ca1c867d160f76188d" }, { "name": "https://tuleap.net/plugins/tracker/?aid=32629", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=32629" } ], "source": { "advisory": "GHSA-xhjp-4rjf-q268", "discovery": "UNKNOWN" }, "title": "Tuleap Cross-site Scripting vulnerability in the card field of the agile dashboard apps" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35929", "datePublished": "2023-07-25T17:30:22.017Z", "dateReserved": "2023-06-20T14:02:45.593Z", "dateUpdated": "2024-10-23T19:56:54.825Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38508 (GCVE-0-2023-38508)
Vulnerability from cvelistv5
Published
2023-08-24 22:33
Modified
2024-10-02 18:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992" }, { "name": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "name": "https://tuleap.net/plugins/tracker/?aid=33608", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=33608" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38508", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:52:23.190616Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T18:54:16.704Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 14.11.99.28" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 14.10-6" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 14.11, \u003c 14.11-3" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T22:33:35.676Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h637-g4xp-2992" }, { "name": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=307c1c8044522a2dcc711062b18a3b3f9059a6c3" }, { "name": "https://tuleap.net/plugins/tracker/?aid=33608", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=33608" } ], "source": { "advisory": "GHSA-h637-g4xp-2992", "discovery": "UNKNOWN" }, "title": "Tuleap allows preview of a linked artifact with a type does not respect permissions" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-38508", "datePublished": "2023-08-24T22:33:35.676Z", "dateReserved": "2023-07-18T16:28:12.078Z", "dateUpdated": "2024-10-02T18:54:16.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-25130 (GCVE-0-2024-25130)
Vulnerability from cvelistv5
Published
2024-02-22 18:29
Modified
2024-08-27 20:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.5.99.76 of Tuleap Community Edition and prior to versions 15.5-4 and 15.4-7 of Tuleap Enterprise Edition, users with a read access to a tracker where the mass update feature is used might get access to restricted information. Tuleap Community Edition 15.5.99.76, Tuleap Enterprise Edition 15.5-4, and Tuleap Enterprise Edition 15.4-7 contain a patch for this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:36:21.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5" }, { "name": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667" }, { "name": "https://tuleap.net/plugins/tracker/?aid=36803", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=36803" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tuleap", "vendor": "enalean", "versions": [ { "lessThan": "15.5.99.76", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "15.5-4", "status": "affected", "version": "15.5", "versionType": "custom" }, { "lessThan": "15.4-7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25130", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-26T17:53:47.840456Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-27T20:46:21.591Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.5.99.76" }, { "status": "affected", "version": "\u003e= 15.5, \u003c 15.5-4" }, { "status": "affected", "version": "\u003c 15.4-7" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.5.99.76 of Tuleap Community Edition and prior to versions 15.5-4 and 15.4-7 of Tuleap Enterprise Edition, users with a read access to a tracker where the mass update feature is used might get access to restricted information. Tuleap Community Edition 15.5.99.76, Tuleap Enterprise Edition 15.5-4, and Tuleap Enterprise Edition 15.4-7 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-22T18:29:10.138Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5" }, { "name": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=57978a32508f5c6d0365419b6eaeb368aee20667" }, { "name": "https://tuleap.net/plugins/tracker/?aid=36803", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=36803" } ], "source": { "advisory": "GHSA-mq7f-m6mj-hjj5", "discovery": "UNKNOWN" }, "title": "Tuleap\u0027s mass update clears the permissions on artifact field" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-25130", "datePublished": "2024-02-22T18:29:10.138Z", "dateReserved": "2024-02-05T14:14:46.381Z", "dateUpdated": "2024-08-27T20:46:21.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-46160 (GCVE-0-2022-46160)
Vulnerability from cvelistv5
Published
2022-12-13 06:40
Modified
2025-04-23 16:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.104, project level authorizations are not properly verified when accessing the project "homepage"/dashboards. Users not authorized to access a project may still be able to get some information provided by the widgets (e.g. number of members, content of the Notes widget...). This issue has been patched in Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4, and Tuleap Enterprise Edition 14.1-5.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:24:03.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8" }, { "name": "https://tuleap.net/plugins/tracker/?aid=29642", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=29642" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-46160", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:52:37.113264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:28:47.584Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 14.2.99.104" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.104, project level authorizations are not properly verified when accessing the project \"homepage\"/dashboards. Users not authorized to access a project may still be able to get some information provided by the widgets (e.g. number of members, content of the Notes widget...). This issue has been patched in Tuleap Community Edition 14.2.99.104, Tuleap Enterprise Edition 14.2-4, and Tuleap Enterprise Edition 14.1-5. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T06:40:05.477Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hjhc-xqjh-9fv3" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0910a7b0ce14763e5c388be6ca4bcfd1c675c5d8" }, { "name": "https://tuleap.net/plugins/tracker/?aid=29642", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=29642" } ], "source": { "advisory": "GHSA-hjhc-xqjh-9fv3", "discovery": "UNKNOWN" }, "title": "Tuleap dashboards vulnerable to Incorrect Authorization" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-46160", "datePublished": "2022-12-13T06:40:05.477Z", "dateReserved": "2022-11-28T17:27:19.997Z", "dateUpdated": "2025-04-23T16:28:47.584Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-46980 (GCVE-0-2024-46980)
Vulnerability from cvelistv5
Published
2024-10-14 17:41
Modified
2024-10-15 15:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46980", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T15:40:53.409250Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T15:41:02.095Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.13.99.37" }, { "status": "affected", "version": "\u003c 15.13-3" }, { "status": "affected", "version": "\u003c 15.12-6" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T17:44:00.617Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj" }, { "name": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dd94a799982cd78ab06142008d745edf9e8fd494", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dd94a799982cd78ab06142008d745edf9e8fd494" }, { "name": "https://tuleap.net/plugins/tracker/?aid=39689", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=39689" } ], "source": { "advisory": "GHSA-9fc9-47h6-82jj", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable to XSS in the HTML mail content of the cross reference field" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-46980", "datePublished": "2024-10-14T17:41:58.663Z", "dateReserved": "2024-09-16T16:10:09.018Z", "dateUpdated": "2024-10-15T15:41:02.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-17298 (GCVE-0-2018-17298)
Vulnerability from cvelistv5
Published
2018-09-21 06:00
Modified
2024-08-05 10:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:47:04.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=12219" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-21T06:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=12219" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-17298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Enalean Tuleap before 10.5. Reset password links are not invalidated after a user changes its password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://tuleap.net/plugins/tracker/?aid=12219", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=12219" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b87d3b807f39c00371ebaa50f938cb0110113538" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=4050b0aafd18346d9a6a06967bfb1170824dab17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-17298", "datePublished": "2018-09-21T06:00:00", "dateReserved": "2018-09-21T00:00:00", "dateUpdated": "2024-08-05T10:47:04.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27401 (GCVE-0-2025-27401)
Vulnerability from cvelistv5
Published
2025-03-04 16:58
Modified
2025-03-04 17:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-440 - Expected Behavior Violation
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27401", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T17:20:27.746696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T17:20:34.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1740498975" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In a standard usages of Tuleap, the issue has a limited impact, it will mostly leave dangling data. However, a malicious user could create and delete reports multiple times to cycle through all the filters of all reports of the instance and delete them. The malicious user only needs to have access to one tracker. This would result in the loss of all criteria filters forcing users and tracker admins to re-create them. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740498975 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440: Expected Behavior Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T16:58:18.478Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3rjf-87rf-h8m9" }, { "name": "https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/0070fef5c3b27fd402d3232041c6e03f79a84ffd" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41850", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41850" } ], "source": { "advisory": "GHSA-3rjf-87rf-h8m9", "discovery": "UNKNOWN" }, "title": "In Tuleap, deleting a report can delete criteria filters in other reports" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27401", "datePublished": "2025-03-04T16:58:18.478Z", "dateReserved": "2025-02-24T15:51:17.267Z", "dateUpdated": "2025-03-04T17:20:34.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41154 (GCVE-0-2021-41154)
Vulnerability from cvelistv5
Published
2021-10-18 21:10
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a "SVN core" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=16213" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 11.17.99.144" }, { "status": "affected", "version": "\u003e= 11.17-1, \u003c 11.17-5" }, { "status": "affected", "version": "\u003e= 11.16-1, \u003c 11.16-7" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a \"SVN core\" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-18T21:10:27", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=16213" } ], "source": { "advisory": "GHSA-6462-gfv9-jf83", "discovery": "UNKNOWN" }, "title": "SQL injection in the \"SVN core\" commits browser", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41154", "STATE": "PUBLIC", "TITLE": "SQL injection in the \"SVN core\" commits browser" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 11.17.99.144" }, { "version_value": "\u003e= 11.17-1, \u003c 11.17-5" }, { "version_value": "\u003e= 11.16-1, \u003c 11.16-7" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions an attacker with read access to a \"SVN core\" repository could execute arbitrary SQL queries. The following versions contain the fix: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83" }, { "name": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ab12b686ced4cf233d3b15b08da008e0553eb6a6" }, { "name": "https://tuleap.net/plugins/tracker/?aid=16213", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=16213" } ] }, "source": { "advisory": "GHSA-6462-gfv9-jf83", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41154", "datePublished": "2021-10-18T21:10:27", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27156 (GCVE-0-2025-27156)
Vulnerability from cvelistv5
Published
2025-03-04 16:53
Modified
2025-03-04 17:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. The mass emailing features do not sanitize the content of the HTML emails. A malicious user could use this issue to facilitate a phishing attempt or to indirectly exploit issues in the recipients mail clients. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740567344 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27156", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T17:21:58.844788Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T17:22:15.113Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1740567344" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The mass emailing features do not sanitize the content of the HTML emails. A malicious user could use this issue to facilitate a phishing attempt or to indirectly exploit issues in the recipients mail clients. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740567344 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T16:53:49.741Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x2v2-xr59-c9cf", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x2v2-xr59-c9cf" }, { "name": "https://github.com/Enalean/tuleap/commit/a0bc657297b405debce1f5bcbbb30c733f3f09bd", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/a0bc657297b405debce1f5bcbbb30c733f3f09bd" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42177", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42177" } ], "source": { "advisory": "GHSA-x2v2-xr59-c9cf", "discovery": "UNKNOWN" }, "title": "Tuleap allows content injection via emails sent by the mass emailing features" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27156", "datePublished": "2025-03-04T16:53:49.741Z", "dateReserved": "2025-02-19T16:30:47.780Z", "dateUpdated": "2025-03-04T17:22:15.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-39902 (GCVE-0-2024-39902)
Vulnerability from cvelistv5
Published
2024-07-22 14:10
Modified
2024-08-02 04:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox "Apply same permissions to all sub-items of this folder" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-39902", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-22T20:17:53.272982Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T20:18:06.197Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "name": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "name": "https://tuleap.net/plugins/tracker/?aid=38675", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.10.99.128" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T14:10:11.992Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "name": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "name": "https://tuleap.net/plugins/tracker/?aid=38675", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" } ], "source": { "advisory": "GHSA-5jq5-vxmq-xrj7", "discovery": "UNKNOWN" }, "title": "Tuleap\u0027s recursive permissions to document manager folder are not properly applied" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-39902", "datePublished": "2024-07-22T14:10:11.992Z", "dateReserved": "2024-07-02T19:37:18.600Z", "dateUpdated": "2024-08-02T04:33:11.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-7178 (GCVE-0-2014-7178)
Vulnerability from cvelistv5
Published
2014-11-28 15:00
Modified
2024-08-06 12:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20141028 CVE-2014-7178 - Remote Command Execution in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/121" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tuleap.org/recent-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-28T12:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20141028 CVE-2014-7178 - Remote Command Execution in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/121" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tuleap.org/recent-vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Enalean Tuleap before 7.5.99.6 allows remote attackers to execute arbitrary commands via the User-Agent header, which is provided to the passthru PHP function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20141028 CVE-2014-7178 - Remote Command Execution in Enalean Tuleap", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/121" }, { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/", "refsource": "MISC", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7178/" }, { "name": "https://www.tuleap.org/recent-vulnerabilities", "refsource": "CONFIRM", "url": "https://www.tuleap.org/recent-vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7178", "datePublished": "2014-11-28T15:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-37167 (GCVE-0-2024-37167)
Vulnerability from cvelistv5
Published
2024-06-25 19:28
Modified
2024-08-02 03:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37167", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-26T13:40:13.974435Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-26T13:40:40.530Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:54.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj" }, { "name": "https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e" }, { "name": "https://tuleap.net/plugins/tracker/?aid=38297", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=38297" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.9.99.97" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users are able to see backlog items that they should not see. This issue has been patched in Tuleap Community Edition version 15.9.99.97." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T19:28:32.858Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4c9f-284j-phvj" }, { "name": "https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/13eec93a353d2daf47bb8b9c548cc02f78b93a5e" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=13eec93a353d2daf47bb8b9c548cc02f78b93a5e" }, { "name": "https://tuleap.net/plugins/tracker/?aid=38297", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=38297" } ], "source": { "advisory": "GHSA-4c9f-284j-phvj", "discovery": "UNKNOWN" }, "title": "Tuleap has improper permissions of the backlog items" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-37167", "datePublished": "2024-06-25T19:28:32.858Z", "dateReserved": "2024-06-03T17:29:38.330Z", "dateUpdated": "2024-08-02T03:50:54.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47766 (GCVE-0-2024-47766)
Vulnerability from cvelistv5
Published
2024-10-14 17:53
Modified
2024-10-15 15:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47766", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T15:37:27.168417Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T15:37:35.456Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.13.99.110" }, { "status": "affected", "version": "\u003c 15.13-5" }, { "status": "affected", "version": "\u003c 15.12-8" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, administrators of a project can access the content of trackers with permissions restrictions of project they are members of but not admin via the cross tracker search widget. Tuleap Community Edition 15.13.99.110, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T17:56:18.186Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-qfrh-fv84-93hx" }, { "name": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/529d11b70796589767dd27a40ebadf3eaf8f5674" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=529d11b70796589767dd27a40ebadf3eaf8f5674", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=529d11b70796589767dd27a40ebadf3eaf8f5674" }, { "name": "https://tuleap.net/plugins/tracker/?aid=39736", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=39736" } ], "source": { "advisory": "GHSA-qfrh-fv84-93hx", "discovery": "UNKNOWN" }, "title": "Permissions are incorrectly verified for project administrators in the cross tracker search widget" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47766", "datePublished": "2024-10-14T17:53:55.763Z", "dateReserved": "2024-09-30T21:28:53.231Z", "dateUpdated": "2024-10-15T15:37:35.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30203 (GCVE-0-2025-30203)
Vulnerability from cvelistv5
Published
2025-03-31 15:48
Modified
2025-03-31 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30203", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T15:55:28.783664Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:34:00.583Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.5.99.1742562878" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the content of RSS feeds in the RSS widgets. A project administrator or someone with control over an used RSS feed could use this vulnerability to force victims to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742562878 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-84", "description": "CWE-84: Improper Neutralization of Encoded URI Schemes in a Web Page", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T15:48:49.651Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-39gx-34fc-rx6r" }, { "name": "https://github.com/Enalean/tuleap/commit/54cce3f5e883d16055cb0239e023f48cdf5eb25f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/54cce3f5e883d16055cb0239e023f48cdf5eb25f" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=54cce3f5e883d16055cb0239e023f48cdf5eb25f", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=54cce3f5e883d16055cb0239e023f48cdf5eb25f" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42243", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42243" } ], "source": { "advisory": "GHSA-39gx-34fc-rx6r", "discovery": "UNKNOWN" }, "title": "Tuleap allows XSS via the content of RSS feeds in the RSS widgets" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30203", "datePublished": "2025-03-31T15:48:49.651Z", "dateReserved": "2025-03-18T18:15:13.849Z", "dateUpdated": "2025-03-31T18:34:00.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27150 (GCVE-0-2025-27150)
Vulnerability from cvelistv5
Published
2025-03-04 16:48
Modified
2025-03-04 18:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-538 - Insertion of Sensitive Information into Externally-Accessible File or Directory
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27150", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T18:52:52.628461Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T18:52:59.756Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1740492866" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-538", "description": "CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T16:48:43.226Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc5r-684x-j46q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc5r-684x-j46q" }, { "name": "https://github.com/Enalean/tuleap/commit/a6702622a8db969a17522b8fac0774afdb1c916f", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/a6702622a8db969a17522b8fac0774afdb1c916f" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41870", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41870" } ], "source": { "advisory": "GHSA-jc5r-684x-j46q", "discovery": "UNKNOWN" }, "title": "Tuleap dumps the Redis password into the generated troubleshooting archives" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27150", "datePublished": "2025-03-04T16:48:43.226Z", "dateReserved": "2025-02-19T16:30:47.779Z", "dateUpdated": "2025-03-04T18:52:59.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7538 (GCVE-0-2018-7538)
Vulnerability from cvelistv5
Published
2018-03-12 21:00
Modified
2024-08-05 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:04.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20180309 Tuleap SQL Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/20" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=11192" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf" }, { "name": "44286", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44286/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20180309 Tuleap SQL Injection", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/20" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/tracker/?aid=11192" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf" }, { "name": "44286", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44286/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A SQL injection vulnerability in the tracker functionality of Enalean Tuleap software engineering platform before 9.18 allows attackers to execute arbitrary SQL commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20180309 Tuleap SQL Injection", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Mar/20" }, { "name": "https://tuleap.net/plugins/tracker/?aid=11192", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/tracker/?aid=11192" }, { "name": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf", "refsource": "MISC", "url": "https://github.com/cmaruti/reports/blob/master/tuleap.pdf" }, { "name": "44286", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44286/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7538", "datePublished": "2018-03-12T21:00:00", "dateReserved": "2018-02-27T00:00:00", "dateUpdated": "2024-08-05T06:31:04.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22129 (GCVE-0-2025-22129)
Vulnerability from cvelistv5
Published
2025-02-03 21:28
Modified
2025-02-04 18:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22129", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T18:40:18.122818Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T18:41:39.965Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=41434" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.3.99.1736242932" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T21:28:55.188Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f34g-wc2m-mf76", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f34g-wc2m-mf76" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=3edf8158ba40be66f0b661888b8b2805784795d1", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=3edf8158ba40be66f0b661888b8b2805784795d1" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41434", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41434" } ], "source": { "advisory": "GHSA-f34g-wc2m-mf76", "discovery": "UNKNOWN" }, "title": "Initial effort field does not respect field permissions in the Taskboard REST card representation in Tuleap" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-22129", "datePublished": "2025-02-03T21:28:55.188Z", "dateReserved": "2024-12-30T03:00:33.651Z", "dateUpdated": "2025-02-04T18:41:39.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31063 (GCVE-0-2022-31063)
Vulnerability from cvelistv5
Published
2022-06-29 17:55
Modified
2025-04-23 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue.
References
► | URL | Tags |
---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=27173" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:04:05.131427Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:05:28.807Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.9.99.111" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-29T17:55:12.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=27173" } ], "source": { "advisory": "GHSA-4fx8-4ff3-96jf", "discovery": "UNKNOWN" }, "title": "Cross site scripting via the title of a document in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31063", "STATE": "PUBLIC", "TITLE": "Cross site scripting via the title of a document in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.9.99.111" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4fx8-4ff3-96jf" }, { "name": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c947975a4f1ff7bbfd7d5cd24a2e16bf12bd96d4" }, { "name": "https://tuleap.net/plugins/tracker/?aid=27173", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=27173" } ] }, "source": { "advisory": "GHSA-4fx8-4ff3-96jf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31063", "datePublished": "2022-06-29T17:55:12.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T18:05:28.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-39521 (GCVE-0-2023-39521)
Vulnerability from cvelistv5
Published
2023-08-24 22:40
Modified
2024-10-02 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
References
► | URL | Tags |
---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:10:21.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc" }, { "name": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d" }, { "name": "https://tuleap.net/plugins/tracker/?aid=33656", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=33656" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-39521", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T18:36:54.343820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T18:38:22.608Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 14.11.99.28" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 14.10-6" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 14.11, \u003c 14.11-3" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T22:40:02.274Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc" }, { "name": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=93d10654b1d95c5bf500204666310418b01b8a8d" }, { "name": "https://tuleap.net/plugins/tracker/?aid=33656", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=33656" } ], "source": { "advisory": "GHSA-h9xc-w7qq-vpfc", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable to Cross-site Scripting on the success message of a kanban deletion" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-39521", "datePublished": "2023-08-24T22:40:02.274Z", "dateReserved": "2023-08-03T16:27:36.262Z", "dateUpdated": "2024-10-02T18:38:22.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23473 (GCVE-0-2022-23473)
Vulnerability from cvelistv5
Published
2022-12-13 06:46
Modified
2025-04-23 16:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.148, Authorizations are not properly verified when accessing MediaWiki standalone resources. Users with read only permissions for pages are able to also edit them. This only affects the MediaWiki standalone plugin. This issue is patched in versions Tuleap Community Edition 14.2.99.148, Tuleap Enterprise Edition 14.2-5, and Tuleap Enterprise Edition 14.1-6.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:43:46.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9" }, { "name": "https://tuleap.net/plugins/tracker/?aid=29645", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=29645" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-23473", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T13:52:33.907917Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:28:41.005Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 14.2.99.148" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In versions prior to 14.2.99.148, Authorizations are not properly verified when accessing MediaWiki standalone resources. Users with read only permissions for pages are able to also edit them. This only affects the MediaWiki standalone plugin. This issue is patched in versions Tuleap Community Edition 14.2.99.148, Tuleap Enterprise Edition 14.2-5, and Tuleap Enterprise Edition 14.1-6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T06:46:17.479Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-c7rr-5vmc-rgcw" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=97cac78302170a883c1d60c9fa6dfd0d95854cb9" }, { "name": "https://tuleap.net/plugins/tracker/?aid=29645", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=29645" } ], "source": { "advisory": "GHSA-c7rr-5vmc-rgcw", "discovery": "UNKNOWN" }, "title": "Tuleap MediaWiki standalone \"readers\" can also edit pages" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-23473", "datePublished": "2022-12-13T06:46:17.479Z", "dateReserved": "2022-01-19T21:23:53.757Z", "dateUpdated": "2025-04-23T16:28:41.005Z", "requesterUserId": "c184a3d9-dc98-4c48-a45b-d2d88cf0ac74", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-47767 (GCVE-0-2024-47767)
Vulnerability from cvelistv5
Published
2024-10-14 17:57
Modified
2024-10-15 15:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tuleap", "vendor": "enalean", "versions": [ { "lessThan": "15.13.99.113", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:enalean:tuleap_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tuleap_enterprise", "vendor": "enalean", "versions": [ { "lessThan": "15.12-8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "15.13-5", "status": "affected", "version": "15.13", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-47767", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T15:31:32.015312Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T15:36:11.946Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.13.99.113" }, { "status": "affected", "version": "\u003c 15.13-5" }, { "status": "affected", "version": "\u003c 15.12-8" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-5, users might see tracker names they should not have access to. Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, and Tuleap Enterprise Edition 15.12-8 fix this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T17:57:11.673Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v" }, { "name": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/16d9efccb2fad8e10343be2604e94c9058ef2c89" }, { "name": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/e5ce81279766115dc0f126a11d6b5065b5db7eec" }, { "name": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/f89d7093d2c576ad5e2b35a6a096fcdaf563d1df" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=16d9efccb2fad8e10343be2604e94c9058ef2c89", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=16d9efccb2fad8e10343be2604e94c9058ef2c89" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=e5ce81279766115dc0f126a11d6b5065b5db7eec", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=e5ce81279766115dc0f126a11d6b5065b5db7eec" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=f89d7093d2c576ad5e2b35a6a096fcdaf563d1df" }, { "name": "https://tuleap.net/plugins/tracker/?aid=39728", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=39728" } ], "source": { "advisory": "GHSA-j342-v27q-329v", "discovery": "UNKNOWN" }, "title": "Tuleap lists trackers in the quick add actions of the backlog without any permissions check" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47767", "datePublished": "2024-10-14T17:57:11.673Z", "dateReserved": "2024-09-30T21:28:53.231Z", "dateUpdated": "2024-10-15T15:36:11.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30155 (GCVE-0-2025-30155)
Vulnerability from cvelistv5
Published
2025-03-31 15:58
Modified
2025-03-31 18:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30155", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:18:05.404015Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:18:13.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.5.99.1742392651" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap does not enforce read permissions on parent trackers in the REST API. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742392651 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T15:58:30.058Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6hr4-h6px-7ppg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6hr4-h6px-7ppg" }, { "name": "https://github.com/Enalean/tuleap/commit/0921df3a1c1aa20fc359b373f001a77c43b1b726", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/0921df3a1c1aa20fc359b373f001a77c43b1b726" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0921df3a1c1aa20fc359b373f001a77c43b1b726", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0921df3a1c1aa20fc359b373f001a77c43b1b726" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42237", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42237" } ], "source": { "advisory": "GHSA-6hr4-h6px-7ppg", "discovery": "UNKNOWN" }, "title": "Tuleap does not enforce read permissions on parent trackers in the REST API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30155", "datePublished": "2025-03-31T15:58:30.058Z", "dateReserved": "2025-03-17T12:41:42.566Z", "dateUpdated": "2025-03-31T18:18:13.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53541 (GCVE-0-2025-53541)
Vulnerability from cvelistv5
Published
2025-07-29 19:27
Modified
2025-07-29 19:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3, malicious users with some control over certain artifacts could insert malicious code when displaying the children of a parent artifact to force victims to execute the uncontrolled code. This is fixed in version Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53541", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-29T19:33:06.339978Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:33:08.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=43693" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "Tuleap Community Edition \u003c 16.9.99.1751892857" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003e= 16.9, \u003c 16.9-3" }, { "status": "affected", "version": "Tuleap Enterprise Edition \u003c 16.8-5" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite created to facilitate management of software development and collaboration. In Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3, malicious users with some control over certain artifacts could insert malicious code when displaying the children of a parent artifact to force victims to execute the uncontrolled code. This is fixed in version Tuleap Community Edition prior to version 16.9.99.1751892857 and Tuleap Enterprise Edition prior to 16.8-5 and 16.9-3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T19:27:38.787Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6r66-j76j-rwhw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-6r66-j76j-rwhw" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c1aec8247697d63dc4af791ecd6bd70d105ded08", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=c1aec8247697d63dc4af791ecd6bd70d105ded08" }, { "name": "https://tuleap.net/plugins/tracker/?aid=43693", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=43693" }, { "name": "http://github.com/Enalean/tuleap/commit/c1aec8247697d63dc4af791ecd6bd70d105ded08", "tags": [ "x_refsource_MISC" ], "url": "http://github.com/Enalean/tuleap/commit/c1aec8247697d63dc4af791ecd6bd70d105ded08" } ], "source": { "advisory": "GHSA-6r66-j76j-rwhw", "discovery": "UNKNOWN" }, "title": "Tuleap is vulnerable to XSS attacks when displaying the children of a parent artifact" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-53541", "datePublished": "2025-07-29T19:27:38.787Z", "dateReserved": "2025-07-02T15:15:11.515Z", "dateUpdated": "2025-07-29T19:33:08.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41148 (GCVE-0-2021-41148)
Vulnerability from cvelistv5
Published
2021-10-15 14:10
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with the ability to add one the CI widget to its personal dashboard could execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=15028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 11.16.99.173" }, { "status": "affected", "version": "\u003e= 11.16-1, \u003c 11.16-6" }, { "status": "affected", "version": "\u003e= 11.15-1, \u003c 11.15-8" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with the ability to add one the CI widget to its personal dashboard could execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-15T14:10:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=15028" } ], "source": { "advisory": "GHSA-3c4q-8c35-cp63", "discovery": "UNKNOWN" }, "title": "The update of the CI job targeted by a widget is vulnerable to blind SQL injections", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41148", "STATE": "PUBLIC", "TITLE": "The update of the CI job targeted by a widget is vulnerable to blind SQL injections" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 11.16.99.173" }, { "version_value": "\u003e= 11.16-1, \u003c 11.16-6" }, { "version_value": "\u003e= 11.15-1, \u003c 11.15-8" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. Prior to version 11.16.99.173 of Community Edition and versions 11.16-6 and 11.15-8 of Enterprise Edition, an attacker with the ability to add one the CI widget to its personal dashboard could execute arbitrary SQL queries. Tuleap Community Edition 11.16.99.173, Tuleap Enterprise Edition 11.16-6, and Tuleap Enterprise Edition 11.15-8 contain a patch for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3c4q-8c35-cp63" }, { "name": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=91535add59f4b3a04b6b8eab123c002cd5af180d" }, { "name": "https://tuleap.net/plugins/tracker/?aid=15028", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=15028" } ] }, "source": { "advisory": "GHSA-3c4q-8c35-cp63", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41148", "datePublished": "2021-10-15T14:10:12", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31058 (GCVE-0-2022-31058)
Vulnerability from cvelistv5
Published
2022-06-29 17:55
Modified
2025-04-23 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=27172" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:51:45.670611Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:05:22.399Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.9.99.95" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-29T17:55:24.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=27172" } ], "source": { "advisory": "GHSA-4v2p-rwq9-3vjf", "discovery": "UNKNOWN" }, "title": "SQL injection via the field name of a tracker in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31058", "STATE": "PUBLIC", "TITLE": "SQL injection via the field name of a tracker in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.9.99.95" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-4v2p-rwq9-3vjf" }, { "name": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b91bcd57c8344ec2a4c1833629e400cef4dd901a" }, { "name": "https://tuleap.net/plugins/tracker/?aid=27172", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=27172" } ] }, "source": { "advisory": "GHSA-4v2p-rwq9-3vjf", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31058", "datePublished": "2022-06-29T17:55:24.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T18:05:22.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41276 (GCVE-0-2021-41276)
Vulnerability from cvelistv5
Published
2021-12-15 19:30
Modified
2024-08-04 03:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:08:31.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=24149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.2.99.31" }, { "status": "affected", "version": "\u003e= 13.1-1, \u003c 13.1-5" }, { "status": "affected", "version": "\u003e= 13.2-1, \u003c 13.2-3" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-90", "description": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-15T19:30:22", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=24149" } ], "source": { "advisory": "GHSA-887w-pv2r-x8pm", "discovery": "UNKNOWN" }, "title": "Indirect LDAP injection in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41276", "STATE": "PUBLIC", "TITLE": "Indirect LDAP injection in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.2.99.31" }, { "version_value": "\u003e= 13.1-1, \u003c 13.1-5" }, { "version_value": "\u003e= 13.2-1, \u003c 13.2-3" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. This issue has been patched in Tuleap Community Edition 13.2.99.31, Tuleap Enterprise Edition 13.1-5, and Tuleap Enterprise Edition 13.2-3." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "name": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=bd47f29847fcd6a68d359bc8aefb8749bb8a1b7c" }, { "name": "https://tuleap.net/plugins/tracker/?aid=24149", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=24149" } ] }, "source": { "advisory": "GHSA-887w-pv2r-x8pm", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41276", "datePublished": "2021-12-15T19:30:22", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T03:08:31.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-43782 (GCVE-0-2021-43782)
Vulnerability from cvelistv5
Published
2021-12-15 19:30
Modified
2024-08-04 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=24168" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.2.99.83" }, { "status": "affected", "version": "\u003e= 13.1-1, \u003c 13.1-6" }, { "status": "affected", "version": "\u003e= 13.2-1, \u003c 13.2-4" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-90", "description": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-15T19:30:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=24168" } ], "source": { "advisory": "GHSA-cwv9-hhm4-jr84", "discovery": "UNKNOWN" }, "title": "Indirect LDAP injection in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-43782", "STATE": "PUBLIC", "TITLE": "Indirect LDAP injection in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.2.99.83" }, { "version_value": "\u003e= 13.1-1, \u003c 13.1-6" }, { "version_value": "\u003e= 13.2-1, \u003c 13.2-4" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (\u0027LDAP Injection\u0027)" } ] }, { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84" }, { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm" }, { "name": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=64e77561eba9f8233199c2962b3497ed7294a7d2" }, { "name": "https://tuleap.net/plugins/tracker/?aid=24168", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=24168" } ] }, "source": { "advisory": "GHSA-cwv9-hhm4-jr84", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-43782", "datePublished": "2021-12-15T19:30:14", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-04T04:03:08.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-46988 (GCVE-0-2024-46988)
Vulnerability from cvelistv5
Published
2024-10-14 17:44
Modified
2024-10-15 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Summary
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tuleap", "vendor": "enalean", "versions": [ { "lessThan": "15.13.99.40", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:enalean:tuleap_enterprise:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tuleap_enterprise", "vendor": "enalean", "versions": [ { "lessThan": "15.12-6", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "15.13-3", "status": "affected", "version": "15.13", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-46988", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T15:38:53.520503Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T15:40:00.721Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.13.99.40" }, { "status": "affected", "version": "\u003c 15.13-3" }, { "status": "affected", "version": "\u003c 15.12-6" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-14T17:44:53.489Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw" }, { "name": "https://tuleap.net/plugins/tracker/?aid=39686", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=39686" } ], "source": { "advisory": "GHSA-g76g-hc92-96xw", "discovery": "UNKNOWN" }, "title": "Tuleap does not properly check permissions for email notifications in trackers" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-46988", "datePublished": "2024-10-14T17:44:53.489Z", "dateReserved": "2024-09-16T16:10:09.019Z", "dateUpdated": "2024-10-15T15:40:00.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-35938 (GCVE-0-2023-35938)
Vulnerability from cvelistv5
Published
2023-06-29 19:33
Modified
2024-11-08 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-281 - Improper Preservation of Permissions
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. When switching from a project visibility that allows restricted users to `Private without restricted`, restricted users that are project administrators keep this access right. Restricted users that were project administrators before the visibility switch keep the possibility to access the project and do some administration actions. This issue has been resolved in Tuleap version 14.9.99.63. Users are advised to upgrade. There are no known workarounds for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:41.256Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q" }, { "name": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91" }, { "name": "https://tuleap.net/plugins/tracker/?aid=32278", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=32278" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35938", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T18:05:29.968891Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T18:05:42.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 14.9.99.63" } ] } ], "descriptions": [ { "lang": "en", "value": " Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. When switching from a project visibility that allows restricted users to `Private without restricted`, restricted users that are project administrators keep this access right. Restricted users that were project administrators before the visibility switch keep the possibility to access the project and do some administration actions. This issue has been resolved in Tuleap version 14.9.99.63. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-281", "description": "CWE-281: Improper Preservation of Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T19:33:59.404Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rq42-cv6q-3m9q" }, { "name": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/a108186e7538676c4bf6e615f793f3b787a09b91" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a108186e7538676c4bf6e615f793f3b787a09b91" }, { "name": "https://tuleap.net/plugins/tracker/?aid=32278", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=32278" } ], "source": { "advisory": "GHSA-rq42-cv6q-3m9q", "discovery": "UNKNOWN" }, "title": "User access not updated with privilege change in Tuleap" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35938", "datePublished": "2023-06-29T19:33:59.404Z", "dateReserved": "2023-06-20T14:02:45.594Z", "dateUpdated": "2024-11-08T18:05:42.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41155 (GCVE-0-2021-41155)
Vulnerability from cvelistv5
Published
2021-10-18 21:10
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=16214" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 11.17.99.146" }, { "status": "affected", "version": "\u003e= 11.17-1, \u003c 11.17-5" }, { "status": "affected", "version": "\u003e= 11.16-1, \u003c 11.16-7" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-18T21:10:18", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=16214" } ], "source": { "advisory": "GHSA-f8jp-hx4q-wxvr", "discovery": "UNKNOWN" }, "title": "SQL injection in CVS revisions browser", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41155", "STATE": "PUBLIC", "TITLE": "SQL injection in CVS revisions browser" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 11.17.99.146" }, { "version_value": "\u003e= 11.17-1, \u003c 11.17-5" }, { "version_value": "\u003e= 11.16-1, \u003c 11.16-7" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not sanitize properly user inputs when constructing the SQL query to browse and search revisions in the CVS repositories. The following versions contain the fix: Tuleap Community Edition 11.17.99.146, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f8jp-hx4q-wxvr" }, { "name": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ff75f2899c60a4546ee2d532e68a3febd07bdd14" }, { "name": "https://tuleap.net/plugins/tracker/?aid=16214", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=16214" } ] }, "source": { "advisory": "GHSA-f8jp-hx4q-wxvr", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41155", "datePublished": "2021-10-18T21:10:18", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-43806 (GCVE-0-2021-43806)
Vulnerability from cvelistv5
Published
2021-12-15 19:45
Modified
2024-08-04 04:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:03:08.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=24202" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.2.99.155" }, { "status": "affected", "version": "\u003e= 13.1-1, \u003c 13.1-7" }, { "status": "affected", "version": "\u003e= 13.2-1, \u003c 13.2-6" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-15T19:45:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=24202" } ], "source": { "advisory": "GHSA-x8fr-8gvw-cc4v", "discovery": "UNKNOWN" }, "title": "SQL injection in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-43806", "STATE": "PUBLIC", "TITLE": "SQL injection in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.2.99.155" }, { "version_value": "\u003e= 13.1-1, \u003c 13.1-7" }, { "version_value": "\u003e= 13.2-1, \u003c 13.2-6" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v" }, { "name": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba" }, { "name": "https://tuleap.net/plugins/tracker/?aid=24202", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=24202" } ] }, "source": { "advisory": "GHSA-x8fr-8gvw-cc4v", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-43806", "datePublished": "2021-12-15T19:45:13", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-04T04:03:08.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-29929 (GCVE-0-2025-29929)
Vulnerability from cvelistv5
Published
2025-03-31 15:40
Modified
2025-03-31 18:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29929", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T16:01:30.002513Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:35:27.933Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.5.99.1742306712" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T15:40:58.925Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hqqr-p5f6-26vv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hqqr-p5f6-26vv" }, { "name": "https://github.com/Enalean/tuleap/commit/dce61747f3a169da1f6b585ad5e6e0847fa3c950", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/dce61747f3a169da1f6b585ad5e6e0847fa3c950" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dce61747f3a169da1f6b585ad5e6e0847fa3c950", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=dce61747f3a169da1f6b585ad5e6e0847fa3c950" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42231", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42231" } ], "source": { "advisory": "GHSA-hqqr-p5f6-26vv", "discovery": "UNKNOWN" }, "title": "Tuleap is missing CSRF protection on tracker hierarchy administration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29929", "datePublished": "2025-03-31T15:40:58.925Z", "dateReserved": "2025-03-12T13:42:22.136Z", "dateUpdated": "2025-03-31T18:35:27.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27099 (GCVE-0-2025-27099)
Vulnerability from cvelistv5
Published
2025-03-03 15:54
Modified
2025-03-03 16:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27099", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-03T16:46:38.136205Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-03T16:46:44.717Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://tuleap.net/plugins/tracker/?aid=41858" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1740067916" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap allows cross-site scripting (XSS) via the tracker names used in the semantic timeframe deletion message. A tracker administrator with a semantic timeframe used by other trackers could use this vulnerability to force other tracker administrators to execute uncontrolled code. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740067916 and Tuleap Enterprise Edition 16.4-5 and 16.3-10." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-03T15:54:33.306Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-vqfj-2gqp-g89x", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-vqfj-2gqp-g89x" }, { "name": "https://github.com/Enalean/tuleap/commit/bec10bd5c98f6570a2857f55e9656eec4b211e6c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/bec10bd5c98f6570a2857f55e9656eec4b211e6c" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41858", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41858" } ], "source": { "advisory": "GHSA-vqfj-2gqp-g89x", "discovery": "UNKNOWN" }, "title": "Tuleap allows XSS via the tracker names used in the semantic timeframe deletion message" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27099", "datePublished": "2025-03-03T15:54:33.306Z", "dateReserved": "2025-02-18T16:44:48.765Z", "dateUpdated": "2025-03-03T16:46:44.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-23344 (GCVE-0-2024-23344)
Vulnerability from cvelistv5
Published
2024-02-06 15:58
Modified
2025-05-09 16:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Some users might get access to restricted information when a process validates the permissions of multiple users (e.g. mail notifications). This issue has been patched in version 15.4.99.140 of Tuleap Community Edition.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w" }, { "name": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42" }, { "name": "https://tuleap.net/plugins/tracker/?aid=35862", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=35862" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23344", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-06T19:08:08.442873Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-09T16:26:14.004Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.4.99.140" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Some users might get access to restricted information when a process validates the permissions of multiple users (e.g. mail notifications). This issue has been patched in version 15.4.99.140 of Tuleap Community Edition." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-06T15:58:19.781Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-m3v5-2j5q-x85w" }, { "name": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/0329e21d268510bc00fed707406103edabf10e42" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0329e21d268510bc00fed707406103edabf10e42" }, { "name": "https://tuleap.net/plugins/tracker/?aid=35862", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=35862" } ], "source": { "advisory": "GHSA-m3v5-2j5q-x85w", "discovery": "UNKNOWN" }, "title": "Tuleap\u0027s content of artifacts might be readable by unauthorized users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-23344", "datePublished": "2024-02-06T15:58:19.781Z", "dateReserved": "2024-01-15T15:19:19.445Z", "dateUpdated": "2025-05-09T16:26:14.004Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-30246 (GCVE-0-2024-30246)
Vulnerability from cvelistv5
Published
2024-03-29 15:50
Modified
2024-08-21 14:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:05.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj" }, { "name": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "name": "https://tuleap.net/plugins/tracker/?aid=37545", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=37545" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-30246", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-21T14:00:19.062511Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-21T14:33:43.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003e= 14.11.99.34, \u003c 15.7.99.6 " } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted. This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440: Expected Behavior Violation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-670", "description": "CWE-670: Always-Incorrect Control Flow Implementation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-29T15:50:19.992Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj" }, { "name": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a0ba0ae82a29eb8bfacef286778e5e49954f5316" }, { "name": "https://tuleap.net/plugins/tracker/?aid=37545", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=37545" } ], "source": { "advisory": "GHSA-jc7g-4pcv-8jcj", "discovery": "UNKNOWN" }, "title": "Tuleap deleting or moving an artifact can delete values from unrelated artifacts" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-30246", "datePublished": "2024-03-29T15:50:19.992Z", "dateReserved": "2024-03-26T12:52:00.932Z", "dateUpdated": "2024-08-21T14:33:43.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-23938 (GCVE-0-2023-23938)
Vulnerability from cvelistv5
Published
2023-04-20 16:58
Modified
2025-02-05 16:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is a Free & Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:49:07.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87" }, { "name": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52" }, { "name": "https://tuleap.net/plugins/tracker/?aid=30734", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=30734" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-23938", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T16:08:13.658764Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T16:08:25.937Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003e= 13.8.99.4, \u003c 14.5.99.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-20T16:58:11.747Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-mqjm-c6rm-9h87" }, { "name": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/aacd5e798301f24f218298ec8236ec7bef0f5d52" }, { "name": "https://tuleap.net/plugins/tracker/?aid=30734", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=30734" } ], "source": { "advisory": "GHSA-mqjm-c6rm-9h87", "discovery": "UNKNOWN" }, "title": "Cross-site Scripting (XSS) through the name of a color of select box values in tuleap" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-23938", "datePublished": "2023-04-20T16:58:11.747Z", "dateReserved": "2023-01-19T21:12:31.361Z", "dateUpdated": "2025-02-05T16:08:25.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31128 (GCVE-0-2022-31128)
Vulnerability from cvelistv5
Published
2022-08-01 16:20
Modified
2025-04-23 17:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=27538" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31128", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:03:10.394893Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T17:56:59.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003e= \u003e= 13.9.99.110, \u003c 13.10.99.82" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-01T16:20:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=27538" } ], "source": { "advisory": "GHSA-2p49-vgcx-5w79", "discovery": "UNKNOWN" }, "title": "Fine grained permissions are not checked in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31128", "STATE": "PUBLIC", "TITLE": "Fine grained permissions are not checked in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003e= \u003e= 13.9.99.110, \u003c 13.10.99.82" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-862: Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79" }, { "name": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=58ecb1dee1c46075d3e089980301ebfbe0bafd33" }, { "name": "https://tuleap.net/plugins/tracker/?aid=27538", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=27538" } ] }, "source": { "advisory": "GHSA-2p49-vgcx-5w79", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31128", "datePublished": "2022-08-01T16:20:13.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T17:56:59.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-39233 (GCVE-0-2022-39233)
Vulnerability from cvelistv5
Published
2022-10-19 00:00
Modified
2025-04-22 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-862 - Missing Authorization
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3884-972x-3ccq" }, { "tags": [ "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "tags": [ "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "tags": [ "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=28848" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-39233", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-22T15:43:32.828237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-22T17:18:31.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003e= 12.9.99.228, \u003c 14.0.99.24" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint `PATCH /gitlab_repositories/{id}`. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-19T00:00:00.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3884-972x-3ccq" }, { "url": "https://github.com/Enalean/tuleap/commit/a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a06cb42d55c840d61a484472ed6b169ab23853ac" }, { "url": "https://tuleap.net/plugins/tracker/?aid=28848" } ], "source": { "advisory": "GHSA-3884-972x-3ccq", "discovery": "UNKNOWN" }, "title": "Tuleap subject to Missing Authorization allowing for branch prefix modification" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39233", "datePublished": "2022-10-19T00:00:00.000Z", "dateReserved": "2022-09-02T00:00:00.000Z", "dateUpdated": "2025-04-22T17:18:31.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-41142 (GCVE-0-2021-41142)
Vulnerability from cvelistv5
Published
2021-10-14 16:05
Modified
2024-08-04 02:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:59:31.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=22570" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 12.11.99.25" }, { "status": "affected", "version": "\u003e= 12.11-1, \u003c 12.11-2" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-14T16:05:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=22570" } ], "source": { "advisory": "GHSA-p3j6-6h9h-34r5", "discovery": "UNKNOWN" }, "title": "XSS via the name of a deleted attachment", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-41142", "STATE": "PUBLIC", "TITLE": "XSS via the name of a deleted attachment" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 12.11.99.25" }, { "version_value": "\u003e= 12.11-1, \u003c 12.11-2" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-p3j6-6h9h-34r5" }, { "name": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/d6c837ed6fa66d319175954a42f93d4d86745208" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d6c837ed6fa66d319175954a42f93d4d86745208" }, { "name": "https://tuleap.net/plugins/tracker/?aid=22570", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=22570" } ] }, "source": { "advisory": "GHSA-p3j6-6h9h-34r5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-41142", "datePublished": "2021-10-14T16:05:13", "dateReserved": "2021-09-15T00:00:00", "dateUpdated": "2024-08-04T02:59:31.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30209 (GCVE-0-2025-30209)
Vulnerability from cvelistv5
Published
2025-03-31 15:53
Modified
2025-03-31 18:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30209", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:19:28.519330Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:19:35.993Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.5.99.1742812323" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker can access release notes content or information via the FRS REST endpoints it should not have access to. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742812323 and Tuleap Enterprise Edition 16.5-6 and 16.4-10." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T15:53:46.455Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hcp5-pmpm-mgwh" }, { "name": "https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/34af2d5d10b0349967129f53427f495815e5bbcc" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=34af2d5d10b0349967129f53427f495815e5bbcc", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=34af2d5d10b0349967129f53427f495815e5bbcc" }, { "name": "https://tuleap.net/plugins/tracker/?aid=42251", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=42251" } ], "source": { "advisory": "GHSA-hcp5-pmpm-mgwh", "discovery": "UNKNOWN" }, "title": "Tuleap has improper permission handling in the REST endpoints and release notes display of the FRS plugin" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30209", "datePublished": "2025-03-31T15:53:46.455Z", "dateReserved": "2025-03-18T18:15:13.849Z", "dateUpdated": "2025-03-31T18:19:35.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-30619 (GCVE-0-2023-30619)
Vulnerability from cvelistv5
Published
2023-05-04 13:35
Modified
2025-01-29 16:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:28:51.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922" }, { "name": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "name": "https://tuleap.net/plugins/tracker/?aid=31586", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=31586" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-30619", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T16:40:21.452758Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-29T16:41:09.864Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": " \u003e= 14.7.99.76, \u003c 14.7.99.143" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap Open ALM is a Libre and Open Source tool for end to end traceability of application and system developments. The title of an artifact is not properly escaped in the tooltip. A malicious user with the capability to create an artifact or to edit a field title could force victim to execute uncontrolled code. This issue has been patched in version 14.7.99.143.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-04T13:35:35.432Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-7fm3-cr3g-5922" }, { "name": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=fdc93a736cbccad05de16ff0cc7cc3ef18dc93df" }, { "name": "https://tuleap.net/plugins/tracker/?aid=31586", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=31586" } ], "source": { "advisory": "GHSA-7fm3-cr3g-5922", "discovery": "UNKNOWN" }, "title": "XSS in the tooltip via an artifact title" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-30619", "datePublished": "2023-05-04T13:35:35.432Z", "dateReserved": "2023-04-13T13:25:18.832Z", "dateUpdated": "2025-01-29T16:41:09.864Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-7176 (GCVE-0-2014-7176)
Vulnerability from cvelistv5
Published
2014-11-04 15:00
Modified
2024-08-06 12:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SQL injection vulnerability in Enalean Tuleap before 7.5.99.4 allows remote authenticated users to execute arbitrary SQL commands via the lobal_txt parameter to plugins/docman.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/" }, { "name": "35098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/35098" }, { "name": "20141028 CVE-2014-7176 - Authenticated Blind SQL Injection in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/119" }, { "name": "70773", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70773" }, { "name": "tuleap-cve20147176-sql-injection(98307)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-28T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in Enalean Tuleap before 7.5.99.4 allows remote authenticated users to execute arbitrary SQL commands via the lobal_txt parameter to plugins/docman." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/" }, { "name": "35098", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/35098" }, { "name": "20141028 CVE-2014-7176 - Authenticated Blind SQL Injection in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/119" }, { "name": "70773", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70773" }, { "name": "tuleap-cve20147176-sql-injection(98307)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7176", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in Enalean Tuleap before 7.5.99.4 allows remote authenticated users to execute arbitrary SQL commands via the lobal_txt parameter to plugins/docman." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/", "refsource": "MISC", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7176/" }, { "name": "35098", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/35098" }, { "name": "20141028 CVE-2014-7176 - Authenticated Blind SQL Injection in Enalean Tuleap", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/119" }, { "name": "70773", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70773" }, { "name": "tuleap-cve20147176-sql-injection(98307)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98307" }, { "name": "https://www.tuleap.org/recent-vulnerabilities", "refsource": "CONFIRM", "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "name": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128875/Tuleap-7.4.99.5-Blind-SQL-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7176", "datePublished": "2014-11-04T15:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-8791 (GCVE-0-2014-8791)
Vulnerability from cvelistv5
Published
2014-12-02 01:00
Modified
2024-08-06 13:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:26:02.600Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "71335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71335" }, { "name": "20141127 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded" }, { "name": "20141129 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/101" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://karmainsecurity.com/KIS-2014-13" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "71335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71335" }, { "name": "20141127 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded" }, { "name": "20141129 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Nov/101" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://karmainsecurity.com/KIS-2014-13" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "project/register.php in Tuleap before 7.7, when sys_create_project_in_one_step is disabled, allows remote authenticated users to conduct PHP object injection attacks and execute arbitrary PHP code via the data parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "71335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71335" }, { "name": "20141127 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/534105/100/0/threaded" }, { "name": "20141129 [KIS-2014-13] Tuleap \u003c= 7.6-4 (register.php) PHP Object Injection Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Nov/101" }, { "name": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/129309/Tuleap-7.6-4-PHP-Object-Injection.html" }, { "name": "http://karmainsecurity.com/KIS-2014-13", "refsource": "MISC", "url": "http://karmainsecurity.com/KIS-2014-13" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8791", "datePublished": "2014-12-02T01:00:00", "dateReserved": "2014-11-13T00:00:00", "dateUpdated": "2024-08-06T13:26:02.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-7411 (GCVE-0-2017-7411)
Vulnerability from cvelistv5
Published
2017-10-30 14:00
Modified
2024-08-05 16:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:04:11.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=10118" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html" }, { "name": "43374", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43374/" }, { "name": "[oss-security] 20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/10/23/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://karmainsecurity.com/KIS-2017-02" }, { "name": "20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Oct/53" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/tracker/?aid=10118" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html" }, { "name": "43374", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43374/" }, { "name": "[oss-security] 20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2017/10/23/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://karmainsecurity.com/KIS-2017-02" }, { "name": "20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Oct/53" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://tuleap.net/plugins/tracker/?aid=10118", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/tracker/?aid=10118" }, { "name": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html" }, { "name": "43374", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43374/" }, { "name": "[oss-security] 20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/10/23/3" }, { "name": "http://karmainsecurity.com/KIS-2017-02", "refsource": "MISC", "url": "http://karmainsecurity.com/KIS-2017-02" }, { "name": "20171023 [KIS-2017-02] Tuleap \u003c= 9.6 Second-Order PHP Object Injection Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2017/Oct/53" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7411", "datePublished": "2017-10-30T14:00:00", "dateReserved": "2017-04-03T00:00:00", "dateUpdated": "2024-08-05T16:04:11.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-7177 (GCVE-0-2014-7177)
Vulnerability from cvelistv5
Published
2014-10-31 14:00
Modified
2024-08-06 12:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70771", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70771" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=7458" }, { "name": "20141028 CVE-2014-7177 - External XML Entity Injection in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/120" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/" }, { "name": "113680", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/113680" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "name": "tuleap-cve20147177-info-disc(98308)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "70771", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70771" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/tracker/?aid=7458" }, { "name": "20141028 CVE-2014-7177 - External XML Entity Injection in Enalean Tuleap", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Oct/120" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/" }, { "name": "113680", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/113680" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "name": "tuleap-cve20147177-info-disc(98308)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70771", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70771" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=blob\u0026h=aed26cbae81410a981c4615bd7da1518f31c50d0\u0026hb=29cbe3557a07c74f3d910648b8c5307e8faef65a\u0026f=ChangeLog" }, { "name": "https://tuleap.net/plugins/tracker/?aid=7458", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/tracker/?aid=7458" }, { "name": "20141028 CVE-2014-7177 - External XML Entity Injection in Enalean Tuleap", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Oct/120" }, { "name": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/", "refsource": "MISC", "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/" }, { "name": "113680", "refsource": "OSVDB", "url": "http://www.osvdb.org/113680" }, { "name": "https://www.tuleap.org/recent-vulnerabilities", "refsource": "CONFIRM", "url": "https://www.tuleap.org/recent-vulnerabilities" }, { "name": "tuleap-cve20147177-info-disc(98308)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98308" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7177", "datePublished": "2014-10-31T14:00:00", "dateReserved": "2014-09-25T00:00:00", "dateUpdated": "2024-08-06T12:40:19.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52599 (GCVE-0-2024-52599)
Vulnerability from cvelistv5
Published
2024-12-09 18:41
Modified
2024-12-10 16:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 16.1.99.50 and Tuleap Enterprise Edition prior to versions 16.1-4 and 16.0-7, a malicious user with the ability to create an artifact in a tracker with a Gantt chart could force a victim to execute uncontrolled code. Tuleap Community Edition 16.1.99.50, Tuleap Enterprise Edition 16.1-4, and Tuleap Enterprise Edition 16.0-7 contain a fix.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52599", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-10T16:17:26.941524Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-10T16:17:35.774Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.1.99.50" }, { "status": "affected", "version": "\u003c 16.1-4" }, { "status": "affected", "version": "\u003c 16.0-7" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 16.1.99.50 and Tuleap Enterprise Edition prior to versions 16.1-4 and 16.0-7, a malicious user with the ability to create an artifact in a tracker with a Gantt chart could force a victim to execute uncontrolled code. Tuleap Community Edition 16.1.99.50, Tuleap Enterprise Edition 16.1-4, and Tuleap Enterprise Edition 16.0-7 contain a fix." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-09T18:41:35.060Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-489c-fm2j-qjw7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-489c-fm2j-qjw7" }, { "name": "https://github.com/Enalean/tuleap/commit/d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5" }, { "name": "https://tuleap.net/plugins/tracker/?aid=40459", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=40459" } ], "source": { "advisory": "GHSA-489c-fm2j-qjw7", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable to XSS in the Gantt chart of the tracker plugin" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-52599", "datePublished": "2024-12-09T18:41:35.060Z", "dateReserved": "2024-11-14T15:05:46.770Z", "dateUpdated": "2024-12-10T16:17:35.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27402 (GCVE-0-2025-27402)
Vulnerability from cvelistv5
Published
2025-03-04 17:00
Modified
2025-03-04 17:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-04T17:17:44.762964Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-04T17:17:56.708Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.4.99.1740414959" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protections on tracker fields administrative operations. An attacker could use this vulnerability to trick victims into removing or updating tracker fields. This vulnerability is fixed in Tuleap Community Edition 16.4.99.1740414959 and Tuleap Enterprise Edition 16.4-6 and 16.3-11." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-04T17:00:49.077Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-66pg-cpjf-2mfg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-66pg-cpjf-2mfg" }, { "name": "https://github.com/Enalean/tuleap/commit/ea6319e2ad40beeda335af4ccd7a204a6912765c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ea6319e2ad40beeda335af4ccd7a204a6912765c" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41857", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41857" } ], "source": { "advisory": "GHSA-66pg-cpjf-2mfg", "discovery": "UNKNOWN" }, "title": "Tuleap is missing CSRF protections on tracker fields administrative operations" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-27402", "datePublished": "2025-03-04T17:00:49.077Z", "dateReserved": "2025-02-24T15:51:17.267Z", "dateUpdated": "2025-03-04T17:17:56.708Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-24029 (GCVE-0-2025-24029)
Vulnerability from cvelistv5
Published
2025-02-03 21:26
Modified
2025-02-04 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users (possibly anonymous ones if the widget is used in the dashboard of a public project) might get access to artifacts they should not see. This issue has been addressed in Tuleap Community Edition 16.3.99.1737562605 as well as Tuleap Enterprise Edition 16.3-5 and Tuleap Enterprise Edition 16.2-7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-24029", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T18:46:33.308747Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T18:47:14.573Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.3.99.1737562605" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users (possibly anonymous ones if the widget is used in the dashboard of a public project) might get access to artifacts they should not see. This issue has been addressed in Tuleap Community Edition 16.3.99.1737562605 as well as Tuleap Enterprise Edition 16.3-5 and Tuleap Enterprise Edition 16.2-7. Users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-280", "description": "CWE-280: Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-03T21:26:38.815Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=269cbaa73bac6d1c50674c48c9987263f2b38804", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=269cbaa73bac6d1c50674c48c9987263f2b38804" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a97480f951351c0f8f2f3f27f7daa3f7f9c37c75", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=a97480f951351c0f8f2f3f27f7daa3f7f9c37c75" }, { "name": "https://tuleap.net/plugins/tracker/?aid=41476", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=41476" } ], "source": { "advisory": "GHSA-hq46-63pc-xfv9", "discovery": "UNKNOWN" }, "title": "Artifact permissions are not verified in the Cross Tracker Search widget in Tuleap" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-24029", "datePublished": "2025-02-03T21:26:38.815Z", "dateReserved": "2025-01-16T17:31:06.460Z", "dateUpdated": "2025-02-04T18:47:14.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-48991 (GCVE-0-2025-48991)
Vulnerability from cvelistv5
Published
2025-06-25 14:07
Modified
2025-06-25 14:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a vulnerability present in Tuleap Community Edition prior to version 16.8.99.1748845907 and Tuleap Enterprise Edition prior to versions 16.8-3 and 16.7-5 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1748845907, Tuleap Enterprise Edition 16.8-3, and Tuleap Enterprise Edition 16.7-5 contain a fix for the vulnerability.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-48991", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T14:16:12.396908Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T14:16:19.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.8.99.1748845907" }, { "status": "affected", "version": "\u003c 16.8-3" }, { "status": "affected", "version": "\u003c 16.7-5" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a vulnerability present in Tuleap Community Edition prior to version 16.8.99.1748845907 and Tuleap Enterprise Edition prior to versions 16.8-3 and 16.7-5 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1748845907, Tuleap Enterprise Edition 16.8-3, and Tuleap Enterprise Edition 16.7-5 contain a fix for the vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T14:07:47.416Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-px9r-875r-w534", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-px9r-875r-w534" }, { "name": "https://github.com/Enalean/tuleap/commit/cbf9b2a38e33dfd755dc2ccf074126b598a78274", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/cbf9b2a38e33dfd755dc2ccf074126b598a78274" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=cbf9b2a38e33dfd755dc2ccf074126b598a78274", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=cbf9b2a38e33dfd755dc2ccf074126b598a78274" }, { "name": "https://tuleap.net/plugins/tracker/?aid=43326", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=43326" } ], "source": { "advisory": "GHSA-px9r-875r-w534", "discovery": "UNKNOWN" }, "title": "Tuleap missing CSRF protection on tracker canned responses administration" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-48991", "datePublished": "2025-06-25T14:07:47.416Z", "dateReserved": "2025-05-29T16:34:07.173Z", "dateUpdated": "2025-06-25T14:16:19.378Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-7634 (GCVE-0-2018-7634)
Vulnerability from cvelistv5
Published
2018-03-01 22:00
Modified
2024-08-05 06:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:31:05.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-05T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-7634", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Enalean Tuleap 9.17. Lack of CSRF attack mitigation while changing an e-mail address makes it possible to abuse the functionality by attackers. By making a CSRF attack, an attacker could make a victim change his registered e-mail address on the application, leading to account takeover." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/", "refsource": "MISC", "url": "https://mustafairan.wordpress.com/2018/03/05/tuleap-mail-change-csrf-vulnerability-leads-to-account-takeover/" }, { "name": "https://tuleap.net/plugins/tracker/?aid=11217", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/tracker/?aid=11217" }, { "name": "https://twitter.com/Mustafaran/status/970745812887199744", "refsource": "MISC", "url": "https://twitter.com/Mustafaran/status/970745812887199744" }, { "name": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/commit/0843c046eee54b16ec6a7753c575838212770189" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d", "refsource": "CONFIRM", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git\u0026a=commit\u0026h=d6701289ae55de900929ff0f66313fa9771a198d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-7634", "datePublished": "2018-03-01T22:00:00", "dateReserved": "2018-03-01T00:00:00", "dateUpdated": "2024-08-05T06:31:05.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-50179 (GCVE-0-2025-50179)
Vulnerability from cvelistv5
Published
2025-06-25 15:48
Modified
2025-06-25 16:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a cross-site request forgery vulnerability in Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1749830289 and Tuleap Enterprise Edition 16.9-1 contain a patch for the issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-50179", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-25T16:00:27.271009Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-25T16:00:32.891Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 16.8.99.1749830289" }, { "status": "affected", "version": "\u003c 16.9-1" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. An attacker could use a cross-site request forgery vulnerability in Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1 to trick victims into changing the canned responses. Tuleap Community Edition 16.8.99.1749830289 and Tuleap Enterprise Edition 16.9-1 contain a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-25T15:48:24.488Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rxpm-g7gw-4mrv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-rxpm-g7gw-4mrv" }, { "name": "https://github.com/Enalean/tuleap/commit/0f9aab6e3640e892c74c9dfc90ad65fd3aff499e", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/0f9aab6e3640e892c74c9dfc90ad65fd3aff499e" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0f9aab6e3640e892c74c9dfc90ad65fd3aff499e", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=0f9aab6e3640e892c74c9dfc90ad65fd3aff499e" }, { "name": "https://tuleap.net/plugins/tracker/?aid=43357", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=43357" } ], "source": { "advisory": "GHSA-rxpm-g7gw-4mrv", "discovery": "UNKNOWN" }, "title": "Tuleap missing CSRF protection on tracker reports manipulation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-50179", "datePublished": "2025-06-25T15:48:24.488Z", "dateReserved": "2025-06-13T19:17:51.726Z", "dateUpdated": "2025-06-25T16:00:32.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-48715 (GCVE-0-2023-48715)
Vulnerability from cvelistv5
Published
2023-12-11 18:40
Modified
2024-10-09 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T21:37:54.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68" }, { "name": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "name": "https://tuleap.net/plugins/tracker/?aid=35143", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=35143" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-48715", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T13:32:37.141200Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T13:32:48.167Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 15.2.99.103" }, { "status": "affected", "version": "\u003e= 15.2, \u003c 15.2-4" }, { "status": "affected", "version": "\u003c 15.1-8" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-22T18:27:48.873Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68" }, { "name": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8" }, { "name": "https://tuleap.net/plugins/tracker/?aid=35143", "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=35143" } ], "source": { "advisory": "GHSA-3m7g-7787-wc68", "discovery": "UNKNOWN" }, "title": "Tuleap vulnerable to Cross-site Scripting on the edition page of a release" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-48715", "datePublished": "2023-12-11T18:40:10.936Z", "dateReserved": "2023-11-17T19:43:37.555Z", "dateUpdated": "2024-10-09T13:32:48.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-31032 (GCVE-0-2022-31032)
Vulnerability from cvelistv5
Published
2022-06-29 17:45
Modified
2025-04-23 18:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:40.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tuleap.net/plugins/tracker/?aid=26816" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-31032", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T14:04:08.094644Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T18:05:36.452Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tuleap", "vendor": "Enalean", "versions": [ { "status": "affected", "version": "\u003c 13.9.99.58" } ] } ], "descriptions": [ { "lang": "en", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-29T17:45:18.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tuleap.net/plugins/tracker/?aid=26816" } ], "source": { "advisory": "GHSA-hvx6-4228-whj3", "discovery": "UNKNOWN" }, "title": "Resources of private projects can be exposed in Tuleap", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31032", "STATE": "PUBLIC", "TITLE": "Resources of private projects can be exposed in Tuleap" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "tuleap", "version": { "version_data": [ { "version_value": "\u003c 13.9.99.58" } ] } } ] }, "vendor_name": "Enalean" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tuleap is a Free \u0026 Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3", "refsource": "CONFIRM", "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hvx6-4228-whj3" }, { "name": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/7e221a9d1893c13407b35008762757a76d8e5654" }, { "name": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca", "refsource": "MISC", "url": "https://github.com/Enalean/tuleap/commit/cc38bcc59ce0c733ca915d95daec5f3082fb17ca" }, { "name": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html", "refsource": "MISC", "url": "https://docs.tuleap.org/administration-guide/users-management/security/site-access.html" }, { "name": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654", "refsource": "MISC", "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=7e221a9d1893c13407b35008762757a76d8e5654" }, { "name": "https://tuleap.net/plugins/tracker/?aid=26816", "refsource": "MISC", "url": "https://tuleap.net/plugins/tracker/?aid=26816" } ] }, "source": { "advisory": "GHSA-hvx6-4228-whj3", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31032", "datePublished": "2022-06-29T17:45:18.000Z", "dateReserved": "2022-05-18T00:00:00.000Z", "dateUpdated": "2025-04-23T18:05:36.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }