{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T17:38:06.845","vulnerabilities":[{"cve":{"id":"CVE-2021-43782","sourceIdentifier":"security-advisories@github.com","published":"2021-12-15T20:15:08.490","lastModified":"2024-11-21T06:29:46.593","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is a Libre and Open Source tool for end to end traceability of application and system developments. This is a follow up to GHSA-887w-pv2r-x8pm/CVE-2021-41276, the initial fix was incomplete. Tuleap does not sanitize properly the search filter built from the ldap_id attribute of a user during the daily synchronization. A malicious user could force accounts to be suspended or take over another account by forcing the update of the ldap_uid attribute. Note that the malicious user either need to have site administrator capability on the Tuleap instance or be an LDAP operator with the capability to create/modify account. The Tuleap instance needs to have the LDAP plugin activated and enabled for this issue to be exploitable. The following versions contain the fix: Tuleap Community Edition 13.2.99.83, Tuleap Enterprise Edition 13.1-6, and Tuleap Enterprise Edition 13.2-4."},{"lang":"es","value":"Tuleap es una herramienta libre y de código abierto para la trazabilidad de extremo a extremo de los desarrollos de aplicaciones y sistemas. Esto es un seguimiento de GHSA-887w-pv2r-x8pm/CVE-2021-41276, la corrección inicial era incompleta. Tuleap no sanea adecuadamente el filtro de búsqueda construido a partir del atributo ldap_id de un usuario durante la sincronización diaria. Un usuario malicioso podría forzar la suspensión de cuentas o tomar el control de otra cuenta al forzar la actualización del atributo ldap_uid. Ten en cuenta que el usuario malicioso debe tener capacidad de administrador del sitio en la instancia de Tuleap o ser un operador LDAP con capacidad para crear/modificar cuentas. La instancia de Tuleap necesita tener el plugin LDAP activado y habilitado para que este problema sea explotable. Las siguientes versiones contienen la corrección: Tuleap Community Edition versión 13.2.99.83, Tuleap Enterprise Edition versión 13.1-6, y Tuleap Enterprise Edition versión 13.2-4"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-90"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"13.2.99.83","matchCriteriaId":"57E21628-895D-4866-8311-00FEDF3172CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.1-1","versionEndExcluding":"13.1-6","matchCriteriaId":"EC827F38-6CE3-4CA7-971D-614DFC80FE33"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.2-1","versionEndExcluding":"13.2-4","matchCriteriaId":"E9CA970A-6199-4407-8C95-49B36EFE0134"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm","source":"security-advisories@github.com","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=64e77561eba9f8233199c2962b3497ed7294a7d2","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]},{"url":"https://tuleap.net/plugins/tracker/?aid=24168","source":"security-advisories@github.com","tags":["Issue Tracking","Patch","Vendor Advisory"]},{"url":"https://github.com/Enalean/tuleap/commit/64e77561eba9f8233199c2962b3497ed7294a7d2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-887w-pv2r-x8pm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable","Third Party Advisory"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-cwv9-hhm4-jr84","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=64e77561eba9f8233199c2962b3497ed7294a7d2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://tuleap.net/plugins/tracker/?aid=24168","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch","Vendor Advisory"]}]}}]}