CVE-2021-43806
Summary
| CVE | CVE-2021-43806 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-12-15 20:15:00 UTC |
| Updated | 2021-12-21 17:32:00 UTC |
| Description | Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SQL injection via the user settings of the CVS commits browser · Advisory · Enalean/tuleap · GitHub | CONFIRM | github.com | |
| request #24202: SQL injection via the user settings of the CVS commit… · Enalean/tuleap@b82be89 · GitHub | MISC | github.com | |
| Git - Tuleap | MISC | tuleap.net | |
| SQL injection via the user settings of the CVS commits browser - request #24202 - Requests - Tuleap | MISC | tuleap.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.