We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-39521

Tuleap vulnerable to Cross-site Scripting on the success message of a kanban deletion



AssignerGitHub_M
Reserved2023-08-03
Published2023-08-24
Updated2024-10-02

Description

Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.



MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Tuleap Community Edition < 14.11.99.28
affected

Tuleap Enterprise Edition < 14.10-6
affected

Tuleap Enterprise Edition >= 14.11, < 14.11-3
affected

References

https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc

https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d

https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d

https://tuleap.net/plugins/tracker/?aid=33656

cve.org CVE-2023-39521

nvd.nist.gov CVE-2023-39521

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.