Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
References
Link | Resource |
---|---|
https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494 | Patch |
https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj | Third Party Advisory |
https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dd94a799982cd78ab06142008d745edf9e8fd494 | Issue Tracking Patch |
https://tuleap.net/plugins/tracker/?aid=39689 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-10-14 18:15
Updated : 2024-10-16 14:05
NVD link : CVE-2024-46980
Mitre link : CVE-2024-46980
CVE.ORG link : CVE-2024-46980
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')