CVE-2023-39521
Summary
| CVE | CVE-2023-39521 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-24 23:15:00 UTC |
| Updated | 2023-08-30 17:43:00 UTC |
| Description | Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the "card fields" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| XSS on the success message of a kanban deletion - request #33656 - Requests - Tuleap | MISC | tuleap.net | |
| Fixes request #33656: XSS on the success message of a kanban deletion · Enalean/tuleap@93d1065 · GitHub | MISC | github.com | |
| XSS on the success message of a kanban deletion · Advisory · Enalean/tuleap · GitHub | MISC | github.com | |
| Git - Tuleap | MISC | tuleap.net | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.