Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11.
References
Link | Resource |
---|---|
https://github.com/Enalean/tuleap/commit/a6702622a8db969a17522b8fac0774afdb1c916f | Patch |
https://github.com/Enalean/tuleap/security/advisories/GHSA-jc5r-684x-j46q | Third Party Advisory Patch |
https://tuleap.net/plugins/tracker/?aid=41870 | Vendor Advisory Issue Tracking Patch |
Configurations
Configuration 1 (hide)
|
History
22 Aug 2025, 15:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Enalean/tuleap/commit/a6702622a8db969a17522b8fac0774afdb1c916f - Patch | |
References | () https://github.com/Enalean/tuleap/security/advisories/GHSA-jc5r-684x-j46q - Third Party Advisory, Patch | |
References | () https://tuleap.net/plugins/tracker/?aid=41870 - Vendor Advisory, Issue Tracking, Patch | |
First Time |
Enalean
Enalean tuleap |
|
CPE | cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:* cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:* |
|
Summary |
|
04 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-04 17:15
Updated : 2025-08-22 15:53
NVD link : CVE-2025-27150
Mitre link : CVE-2025-27150
CVE.ORG link : CVE-2025-27150
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory