CVE-2023-39521

Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*
cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*

History

21 Nov 2024, 08:15

Type Values Removed Values Added
References () https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d - Patch () https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d - Patch
References () https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc - Patch, Vendor Advisory () https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc - Patch, Vendor Advisory
References () https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d - Patch () https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d - Patch
References () https://tuleap.net/plugins/tracker/?aid=33656 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://tuleap.net/plugins/tracker/?aid=33656 - Exploit, Issue Tracking, Patch, Vendor Advisory

30 Aug 2023, 17:43

Type Values Removed Values Added
References (MISC) https://tuleap.net/plugins/tracker/?aid=33656 - (MISC) https://tuleap.net/plugins/tracker/?aid=33656 - Exploit, Issue Tracking, Patch, Vendor Advisory
References (MISC) https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d - (MISC) https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d - Patch
References (MISC) https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc - (MISC) https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc - Patch, Vendor Advisory
References (MISC) https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d - (MISC) https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
CPE cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*
First Time Enalean
Enalean tuleap

24 Aug 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-24 23:15

Updated : 2024-11-21 08:15


NVD link : CVE-2023-39521

Mitre link : CVE-2023-39521

CVE.ORG link : CVE-2023-39521


JSON object : View

Products Affected

enalean

  • tuleap
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')