Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 22 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:* cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* |
Tue, 04 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Mar 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11. | |
Title | Tuleap dumps the Redis password into the generated troubleshooting archives | |
Weaknesses | CWE-538 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-04T18:52:59.756Z
Reserved: 2025-02-19T16:30:47.779Z
Link: CVE-2025-27150

Updated: 2025-03-04T18:52:56.382Z

Status : Analyzed
Published: 2025-03-04T17:15:18.663
Modified: 2025-08-22T15:53:42.620
Link: CVE-2025-27150

No data.

Updated: 2025-07-13T11:07:03Z