Vulnerability Description
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, a site administrator could create an artifact link type with a forward label allowing them to execute uncontrolled code (or at least achieve content injection) in a mail client. Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enalean | Tuleap | < 15.12-6 |
Related Weaknesses (CWE)
References
- https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd49Patch
- https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jjThird Party Advisory
- https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dd94a799982cd78abIssue TrackingPatch
- https://tuleap.net/plugins/tracker/?aid=39689ExploitThird Party Advisory
FAQ
What is CVE-2024-46980?
CVE-2024-46980 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.37, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15....
How severe is CVE-2024-46980?
CVE-2024-46980 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-46980?
Check the references section above for vendor advisories and patch information. Affected products include: Enalean Tuleap.