CVE-2022-31058
Summary
| CVE | CVE-2022-31058 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-06-29 18:15:00 UTC |
| Updated | 2022-07-15 10:18:00 UTC |
| Description | Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| request #27166: Naming a field "id" breaks the report · Enalean/tuleap@b91bcd5 · GitHub | MISC | github.com | |
| Git - Tuleap | MISC | tuleap.net | |
| SQL injection via the field name of a tracker - request #27172 - Requests - Tuleap | MISC | tuleap.net | |
| SQL injection via the field name of a tracker · Advisory · Enalean/tuleap · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.