Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8 - Patch | |
References | () https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68 - Vendor Advisory | |
References | () https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8 - Patch | |
References | () https://tuleap.net/plugins/tracker/?aid=35143 - Patch, Vendor Advisory |
22 Feb 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Tuleap is an open source suite to improve management of software developments and collaboration. Prior to version 15.2.99.103 of Tuleap Community Edition and prior to versions 15.2-4 and 15.1-8 of Tuleap Enterprise Edition, the name of the releases are not properly escaped on the edition page of a release. A malicious user with the ability to create a FRS release could force a victim having write permissions in the FRS to execute uncontrolled code. Tuleap Community Edition 15.2.99.103, Tuleap Enterprise Edition 15.2-4, and Tuleap Enterprise Edition 15.1-8 contain a fix for this issue. |
14 Dec 2023, 14:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:* |
|
First Time |
Enalean tuleap
Enalean |
|
References | () https://tuleap.net/plugins/tracker/?aid=35143 - Patch, Vendor Advisory | |
References | () https://github.com/Enalean/tuleap/commit/ea71ec7ee062aae8d1fa7a7325aaa759205c17d8 - Patch | |
References | () https://github.com/Enalean/tuleap/security/advisories/GHSA-3m7g-7787-wc68 - Vendor Advisory | |
References | () https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=ea71ec7ee062aae8d1fa7a7325aaa759205c17d8 - Patch |
11 Dec 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-11 19:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-48715
Mitre link : CVE-2023-48715
CVE.ORG link : CVE-2023-48715
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')