Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. In affected versions Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories. A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries. Tuleap instances without an active CVS repositories are not impacted. The following versions contain the fix: Tuleap Community Edition 13.2.99.155, Tuleap Enterprise Edition 13.1-7, and Tuleap Enterprise Edition 13.2-6.
References
Link | Resource |
---|---|
https://github.com/Enalean/tuleap/security/advisories/GHSA-x8fr-8gvw-cc4v | Patch Third Party Advisory |
https://tuleap.net/plugins/tracker/?aid=24202 | Issue Tracking Patch Vendor Advisory |
https://github.com/Enalean/tuleap/commit/b82be896b00a787ed46a77bd4700e8fccfe2e5ba | Patch Third Party Advisory |
https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=b82be896b00a787ed46a77bd4700e8fccfe2e5ba | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-12-15 12:15
Updated : 2021-12-21 09:32
NVD link : CVE-2021-43806
Mitre link : CVE-2021-43806
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
enalean
- tuleap