XML External Entity vulnerability in Enalean Tuleap 7.2 and earlier allows remote authenticated users to read arbitrary files via a crafted xml document in a create action to plugins/tracker/.
References
Configurations
History
21 Nov 2024, 02:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2014/Oct/120 - Exploit | |
References | () http://www.osvdb.org/113680 - | |
References | () http://www.securityfocus.com/bid/70771 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98308 - | |
References | () https://tuleap.net/plugins/git/tuleap/tuleap/stable?p=tuleap%2Fstable.git&a=blob&h=aed26cbae81410a981c4615bd7da1518f31c50d0&hb=29cbe3557a07c74f3d910648b8c5307e8faef65a&f=ChangeLog - | |
References | () https://tuleap.net/plugins/tracker/?aid=7458 - Vendor Advisory | |
References | () https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-7177/ - Exploit | |
References | () https://www.tuleap.org/recent-vulnerabilities - Vendor Advisory |
Information
Published : 2014-10-31 14:55
Updated : 2024-11-21 02:16
NVD link : CVE-2014-7177
Mitre link : CVE-2014-7177
CVE.ORG link : CVE-2014-7177
JSON object : View
Products Affected
enalean
- tuleap
CWE