CVE-2014-7177

XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/.
Configurations

Configuration 1 (hide)

cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:16

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2014/Oct/120 - Exploit () http://seclists.org/fulldisclosure/2014/Oct/120 - Exploit
References () http://www.osvdb.org/113680 - () http://www.osvdb.org/113680 -
References () http://www.securityfocus.com/bid/70771 - () http://www.securityfocus.com/bid/70771 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/98308 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/98308 -
References () https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=blob&h=aed26cbae81410a981c4615bd7da1518f31c50d0&hb=29cbe3557a07c74f3d910648b8c5307e8faef65a&f=ChangeLog - () https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=blob&h=aed26cbae81410a981c4615bd7da1518f31c50d0&hb=29cbe3557a07c74f3d910648b8c5307e8faef65a&f=ChangeLog -
References () https://tuleap.net/plugins/tracker/?aid=7458 - Vendor Advisory () https://tuleap.net/plugins/tracker/?aid=7458 - Vendor Advisory
References () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/ - Exploit () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/ - Exploit
References () https://www.tuleap.org/recent-vulnerabilities - Vendor Advisory () https://www.tuleap.org/recent-vulnerabilities - Vendor Advisory

Information

Published : 2014-10-31 14:55

Updated : 2024-11-21 02:16


NVD link : CVE-2014-7177

Mitre link : CVE-2014-7177

CVE.ORG link : CVE-2014-7177


JSON object : View

Products Affected

enalean

  • tuleap