{"api_version":"1","generated_at":"2026-04-25T03:03:24+00:00","cve":"CVE-2021-43806","urls":{"html":"https://cve.report/CVE-2021-43806","api":"https://cve.report/api/cve/CVE-2021-43806.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-43806","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-43806"},"summary":{"title":"CVE-2021-43806","description":"Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-12-15 20:15:00","updated_at":"2021-12-21 17:32:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v","name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v","refsource":"CONFIRM","tags":[],"title":"SQL injection via the user settings of the CVS commits browser · Advisory · Enalean/tuleap · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba","name":"https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba","refsource":"MISC","tags":[],"title":"request #24202: SQL injection via the user settings of the CVS commit… · Enalean/tuleap@b82be89 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba","name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba","refsource":"MISC","tags":[],"title":"Git - Tuleap","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://tuleap.net/plugins/tracker/?aid=24202","name":"https://tuleap.net/plugins/tracker/?aid=24202","refsource":"MISC","tags":[],"title":"SQL injection via the user settings of the CVS commits browser - request #24202 - Requests - Tuleap","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-43806","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43806","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"43806","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"enalean","cpe5":"tuleap","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"community","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"43806","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"enalean","cpe5":"tuleap","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-43806","STATE":"PUBLIC","TITLE":"SQL injection in Tuleap"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"tuleap","version":{"version_data":[{"version_value":"< 13.2.99.155"},{"version_value":">= 13.1-1, < 13.1-7"},{"version_value":">= 13.2-1, < 13.2-6"}]}}]},"vendor_name":"Enalean"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}]},"references":{"reference_data":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v","refsource":"CONFIRM","url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v"},{"name":"https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba","refsource":"MISC","url":"https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba","refsource":"MISC","url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba"},{"name":"https://tuleap.net/plugins/tracker/?aid=24202","refsource":"MISC","url":"https://tuleap.net/plugins/tracker/?aid=24202"}]},"source":{"advisory":"GHSA-x8fr-8gvw-cc4v","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-12-15 20:15:00","lastModifiedDate":"2021-12-21 17:32:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.1-1","versionEndExcluding":"13.1-7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.2-1","versionEndExcluding":"13.2-6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"13.2.99.155","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"43806","Ordinal":"221365","Title":"CVE-2021-43806","CVE":"CVE-2021-43806","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"43806","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}