Lucene search

K
nvd[email protected]NVD:CVE-2023-23938
HistoryApr 20, 2023 - 5:15 p.m.

CVE-2023-23938

2023-04-2017:15:07
CWE-79
web.nvd.nist.gov
2
tuleap
cross-site scripting
select box
tracker administration
privilege
vulnerability
upgrade

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

35.2%

Tuleap is a Free & Source tool for end to end traceability of application and system developments. Affected versions are subject to a cross site scripting attack which can be injected in the name of a color of select box values of a tracker and then reflected in the tracker administration. Administrative privilege is required, but an attacker with tracker administration rights could use this vulnerability to force a victim to execute uncontrolled code in the context of their browser. This issue has been addressed in Tuleap Community Edition version 14.5.99.4. Users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Nvd
Node
enaleantuleapRange<14.4-7enterprise
OR
enaleantuleapRange13.8.99.4914.5.99.4community
OR
enaleantuleapRange14.514.5-2enterprise
VendorProductVersionCPE
enaleantuleap*cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*
enaleantuleap*cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*

CVSS3

4.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

35.2%

Related for NVD:CVE-2023-23938