cve/2024/CVE-2024-46988.md
2025-09-29 21:09:30 +02:00

23 lines
1.4 KiB
Markdown

### [CVE-2024-46988](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46988)
![](https://img.shields.io/static/v1?label=Product&message=tuleap&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.12-6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.13-3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2015.13.99.40%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=15.13%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&color=brightgreen)
### Description
Tuleap is a tool for end to end traceability of application and system developments. Prior to Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6, users might receive email notification with information they should not have access to. Tuleap Community Edition 15.13.99.40, Tuleap Enterprise Edition 15.13-3, and Tuleap Enterprise Edition 15.12-6 fix this issue.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/fkie-cad/nvd-json-data-feeds