| ID |
CVE-2023-32072
|
| Sažetak |
Tuleap is an open source tool for end to end traceability of application and system developments. Tuleap Community Edition prior to version 14.8.99.60 and Tuleap Enterprise edition prior to 14.8-3 and 14.7-7, the logs of the triggered Jenkins job URLs are not properly escaped. A malicious Git administrator can setup a malicious Jenkins hook to make a victim, also a Git administrator, execute uncontrolled code. Tuleap Community Edition 14.8.99.60, Tuleap Enterprise Edition 14.8-3, and Tuleap Enterprise Edition 14.7-7 contain a patch for this issue. |
| Reference |
|
| CVSS |
| Base: | 4.8 |
| Impact: | 2.7 |
| Exploitability: | 1.7 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
- |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| LOW |
LOW |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N |
| Zadnje važnije ažuriranje |
05-06-2023 - 15:42 |
| Objavljeno |
29-05-2023 - 21:15 |