Unrated severityNVD Advisory· Published Aug 24, 2023· Updated Oct 2, 2024
Tuleap vulnerable to Cross-site Scripting on the success message of a kanban deletion
CVE-2023-39521
Description
Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8dmitrex_refsource_MISC
- github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfcmitrex_refsource_CONFIRM
- tuleap.net/plugins/git/tuleap/tuleap/stablemitrex_refsource_MISC
- tuleap.net/plugins/tracker/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.