{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-39521","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-08-03T16:27:36.262Z","datePublished":"2023-08-24T22:40:02.274Z","dateUpdated":"2024-10-02T18:38:22.608Z"},"containers":{"cna":{"title":"Tuleap vulnerable to Cross-site Scripting on the success message of a kanban deletion","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc"},{"name":"https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d","tags":["x_refsource_MISC"],"url":"https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d"},{"name":"https://tuleap.net/plugins/tracker/?aid=33656","tags":["x_refsource_MISC"],"url":"https://tuleap.net/plugins/tracker/?aid=33656"}],"affected":[{"vendor":"Enalean","product":"tuleap","versions":[{"version":"Tuleap Community Edition < 14.11.99.28","status":"affected"},{"version":"Tuleap Enterprise Edition < 14.10-6","status":"affected"},{"version":"Tuleap Enterprise Edition >= 14.11, < 14.11-3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-08-24T22:40:02.274Z"},"descriptions":[{"lang":"en","value":"Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, content displayed in the \"card fields\" (visible in the kanban and PV2 apps) is not properly escaped. An agile dashboard administrator deleting a kanban with a malicious label can be forced to execute uncontrolled code. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue."}],"source":{"advisory":"GHSA-h9xc-w7qq-vpfc","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T18:10:21.142Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-h9xc-w7qq-vpfc"},{"name":"https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/Enalean/tuleap/commit/93d10654b1d95c5bf500204666310418b01b8a8d"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d","tags":["x_refsource_MISC","x_transferred"],"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=93d10654b1d95c5bf500204666310418b01b8a8d"},{"name":"https://tuleap.net/plugins/tracker/?aid=33656","tags":["x_refsource_MISC","x_transferred"],"url":"https://tuleap.net/plugins/tracker/?aid=33656"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-02T18:36:54.343820Z","id":"CVE-2023-39521","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-02T18:38:22.608Z"}}]}}