Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-38508

Tuleap is an open source suite to improve management of software developments and collaboration. In Tuleap Community Edition prior to version 14.11.99.28 and Tuleap Enterprise Edition prior to versions 14.10-6 and 14.11-3, the preview of an artifact link with a type does not respect the project, tracker and artifact level permissions. The issue occurs on the artifact view (not reproducible on the artifact modal). Users might get access to information they should not have access to. Only the title, status, assigned to and last update date fields as defined by the semantics are impacted. If those fields have strict permissions (e.g. the title is only visible to a specific user group) those permissions are still enforced. Tuleap Community Edition 14.11.99.28, Tuleap Enterprise Edition 14.10-6, and Tuleap Enterprise Edition 14.11-3 contain a fix for this issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 36.1%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2023-38508
  • Enalean » Tuleap » Version: Any
    cpe:2.3:a:enalean:tuleap:*
  • Enalean » Tuleap » Version: N/A
    cpe:2.3:a:enalean:tuleap:-
  • Enalean » Tuleap » Version: 11.15-1
    cpe:2.3:a:enalean:tuleap:11.15-1
  • Enalean » Tuleap » Version: 11.15-8
    cpe:2.3:a:enalean:tuleap:11.15-8
  • Enalean » Tuleap » Version: 11.16-1
    cpe:2.3:a:enalean:tuleap:11.16-1
  • Enalean » Tuleap » Version: 11.16-6
    cpe:2.3:a:enalean:tuleap:11.16-6
  • Enalean » Tuleap » Version: 11.16-7
    cpe:2.3:a:enalean:tuleap:11.16-7
  • Enalean » Tuleap » Version: 11.16.99.173
    cpe:2.3:a:enalean:tuleap:11.16.99.173
  • Enalean » Tuleap » Version: 11.17-1
    cpe:2.3:a:enalean:tuleap:11.17-1
  • Enalean » Tuleap » Version: 11.17-5
    cpe:2.3:a:enalean:tuleap:11.17-5
  • Enalean » Tuleap » Version: 11.17.99.144
    cpe:2.3:a:enalean:tuleap:11.17.99.144
  • Enalean » Tuleap » Version: 11.17.99.146
    cpe:2.3:a:enalean:tuleap:11.17.99.146
  • Enalean » Tuleap » Version: 12.10
    cpe:2.3:a:enalean:tuleap:12.10
  • Enalean » Tuleap » Version: 12.11-2
    cpe:2.3:a:enalean:tuleap:12.11-2
  • Enalean » Tuleap » Version: 12.9.99.228
    cpe:2.3:a:enalean:tuleap:12.9.99.228
  • Enalean » Tuleap » Version: 13.12-6
    cpe:2.3:a:enalean:tuleap:13.12-6
  • Enalean » Tuleap » Version: 13.6-5
    cpe:2.3:a:enalean:tuleap:13.6-5
  • Enalean » Tuleap » Version: 13.7-1
    cpe:2.3:a:enalean:tuleap:13.7-1
  • Enalean » Tuleap » Version: 13.7-4
    cpe:2.3:a:enalean:tuleap:13.7-4
  • Enalean » Tuleap » Version: 13.7.99.239
    cpe:2.3:a:enalean:tuleap:13.7.99.239
  • Enalean » Tuleap » Version: 13.8.99.49
    cpe:2.3:a:enalean:tuleap:13.8.99.49
  • Enalean » Tuleap » Version: 14.0
    cpe:2.3:a:enalean:tuleap:14.0
  • Enalean » Tuleap » Version: 14.0-3
    cpe:2.3:a:enalean:tuleap:14.0-3
  • Enalean » Tuleap » Version: 14.0.99.24
    cpe:2.3:a:enalean:tuleap:14.0.99.24
  • Enalean » Tuleap » Version: 14.10
    cpe:2.3:a:enalean:tuleap:14.10
  • Enalean » Tuleap » Version: 14.10-2
    cpe:2.3:a:enalean:tuleap:14.10-2
  • Enalean » Tuleap » Version: 14.10.99.4
    cpe:2.3:a:enalean:tuleap:14.10.99.4
  • Enalean » Tuleap » Version: 14.4-7
    cpe:2.3:a:enalean:tuleap:14.4-7
  • Enalean » Tuleap » Version: 14.5
    cpe:2.3:a:enalean:tuleap:14.5
  • Enalean » Tuleap » Version: 14.5-2
    cpe:2.3:a:enalean:tuleap:14.5-2
  • Enalean » Tuleap » Version: 14.5.99.4
    cpe:2.3:a:enalean:tuleap:14.5.99.4
  • Enalean » Tuleap » Version: 14.7-7
    cpe:2.3:a:enalean:tuleap:14.7-7
  • Enalean » Tuleap » Version: 14.7.99.143
    cpe:2.3:a:enalean:tuleap:14.7.99.143
  • Enalean » Tuleap » Version: 14.7.99.76
    cpe:2.3:a:enalean:tuleap:14.7.99.76
  • Enalean » Tuleap » Version: 14.8
    cpe:2.3:a:enalean:tuleap:14.8
  • Enalean » Tuleap » Version: 14.8-3
    cpe:2.3:a:enalean:tuleap:14.8-3
  • Enalean » Tuleap » Version: 14.8.99.60
    cpe:2.3:a:enalean:tuleap:14.8.99.60
  • Enalean » Tuleap » Version: 14.9-5
    cpe:2.3:a:enalean:tuleap:14.9-5


Contact Us

Shodan ® - All rights reserved