Description
Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/Enalean/tuleap/security/advisories/GHSA-6prc-j58r-fmjq
Patch x_refsource_misc
https://github.com/Enalean/tuleap/commit/6840529def97f564844e810e5a7c5bf837cf58d5
Patch x_refsource_misc
https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=6840529def97f564844e810e5a7c5bf837cf58d5
Vendor Advisory x_refsource_misc
https://tuleap.net/plugins/tracker/?aid=31929
Scores
CVSS v3
4.8
EPSS
0.0039
EPSS Percentile
60.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
enalean/tuleap
< 14.7-7
enalean/tuleap
< 14.8.99.60
Published
May 29, 2023
Tracked Since
Feb 18, 2026