{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-35929","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-06-20T14:02:45.593Z","datePublished":"2023-07-25T17:30:22.017Z","dateUpdated":"2024-10-23T19:56:54.825Z"},"containers":{"cna":{"title":"Tuleap Cross-site Scripting vulnerability in the card field of the agile dashboard apps","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268"},{"name":"https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d","tags":["x_refsource_MISC"],"url":"https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d"},{"name":"https://tuleap.net/plugins/tracker/?aid=32629","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/tracker/?aid=32629"}],"affected":[{"vendor":"Enalean","product":"tuleap","versions":[{"version":"Tuleap Community Edition < 14.10.99.4","status":"affected"},{"version":"Tuleap Enterprise Edition < 14.9-5","status":"affected"},{"version":"Tuleap Enterprise Edition >= 14.10, < 14.10-2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-07-25T17:30:22.017Z"},"descriptions":[{"lang":"en","value":"Tuleap is a free and open source suite to improve management of software development and collaboration. Prior to version 14.10.99.4 of Tuleap Community Edition and prior to versions 14.10-2 and 14.9-5 of Tuleap Enterprise Edition, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. A malicious user with the capability to create an artifact or to edit a field used as a card field could force victim to execute uncontrolled code. Tuleap Community Edition 14.10.99.4, Tuleap Enterprise Edition 14.10-2, and Tuleap Enterprise Edition 14.9-5 contain a fix."}],"source":{"advisory":"GHSA-xhjp-4rjf-q268","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:37:41.169Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-xhjp-4rjf-q268"},{"name":"https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/Enalean/tuleap/commit/0b2945fbd260d37aa0aff2ca1c867d160f76188d"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d","tags":["x_refsource_MISC","x_transferred"],"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=0b2945fbd260d37aa0aff2ca1c867d160f76188d"},{"name":"https://tuleap.net/plugins/tracker/?aid=32629","tags":["x_refsource_MISC","x_transferred"],"url":"https://tuleap.net/plugins/tracker/?aid=32629"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T19:56:29.979610Z","id":"CVE-2023-35929","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T19:56:54.825Z"}}]}}