Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 16.1.99.50 and Tuleap Enterprise Edition prior to versions 16.1-4 and 16.0-7, a malicious user with the ability to create an artifact in a tracker with a Gantt chart could force a victim to execute uncontrolled code. Tuleap Community Edition 16.1.99.50, Tuleap Enterprise Edition 16.1-4, and Tuleap Enterprise Edition 16.0-7 contain a fix.
References
| Link | Resource |
|---|---|
| https://github.com/Enalean/tuleap/commit/d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5 | Patch |
| https://github.com/Enalean/tuleap/security/advisories/GHSA-489c-fm2j-qjw7 | Third Party Advisory Patch |
| https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=d3686ab152b6f64ff835e7dd3c99d97b36a9d4d5 | Permissions Required |
| https://tuleap.net/plugins/tracker/?aid=40459 | Third Party Advisory Issue Tracking Patch Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-12-09 19:15
Updated : 2025-08-22 16:19
NVD link : CVE-2024-52599
Mitre link : CVE-2024-52599
CVE.ORG link : CVE-2024-52599
JSON object : View
Products Affected
enalean
- tuleap
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
