Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
History

Wed, 16 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Enalean
Enalean tuleap
CPEs cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*
cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*
Vendors & Products Enalean
Enalean tuleap

Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Oct 2024 17:45:00 +0000

Type Values Removed Values Added
Description Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
Title Tuleap vulnerable to XSS in the HTML mail content of the cross reference field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-10-14T17:41:58.663Z

Updated: 2024-10-15T15:41:02.095Z

Reserved: 2024-09-16T16:10:09.018Z

Link: CVE-2024-46980

cve-icon Vulnrichment

Updated: 2024-10-15T15:40:58.100Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-14T18:15:03.947

Modified: 2024-10-16T14:05:27.090

Link: CVE-2024-46980

cve-icon Redhat

No data.