Skip to content

SQL injection via the field name of a tracker

High
LeSuisse published GHSA-4v2p-rwq9-3vjf Jun 29, 2022

Package

Tuleap Community Edition (tuleap)

Affected versions

< 13.9.99.95

Patched versions

13.9.99.95
Tuleap Enterprise Edition (tuleap)
<13.9-3
< 13.8-6
13.9-3
13.8-6

Description

Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports.

Impact

An attacker with the capability to create a new tracker can execute arbitrary SQL queries.

Patches

The following versions contain the fix:

  • Tuleap Community Edition 13.9.99.95
  • Tuleap Enterprise Edition 13.9-3
  • Tuleap Enterprise Edition 13.8-6

For more information

If you have any questions or comments about this advisory, reach out to us via the contact information provided on the Tuleap.org security page.

References

Severity

High
7.2
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE ID

CVE-2022-31058

Weaknesses