### [CVE-2024-46988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46988) ![](https://img.shields.io/static/v1?label=Product&message=tuleap&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.12-6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.13-3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.13.99.40%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=15.13%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&color=brightgreen) ### Description Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/fkie-cad/nvd-json-data-feeds