{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T22:11:35.075","vulnerabilities":[{"cve":{"id":"CVE-2024-30246","sourceIdentifier":"security-advisories@github.com","published":"2024-03-29T16:15:08.860","lastModified":"2025-07-10T17:13:14.807","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an Open Source Suite to improve management of software developments and collaboration. A malicious user could exploit this issue on purpose to delete information on the instance or possibly gain access to restricted artifacts. It is however not possible to control exactly which information is deleted. Information from theDate, File, Float, Int, List, OpenList, Text, and Permissions on artifact (this one can lead to the disclosure of restricted information) fields can be impacted.  This vulnerability is fixed in Tuleap Community Edition version 15.7.99.6 and Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9, and 14.12-6."},{"lang":"es","value":"Tuleap es una suite de código abierto para mejorar la gestión de los desarrollos de software y la colaboración. Un usuario malintencionado podría aprovechar este problema a propósito para eliminar información de la instancia o posiblemente obtener acceso a artefactos restringidos. Sin embargo, no es posible controlar exactamente qué información se elimina. La información de los campos Fecha, Archivo, Flotante, Int, Lista, Lista abierta, Texto y Permisos en artefactos (este puede conducir a la divulgación de información restringida) puede verse afectada. Esta vulnerabilidad se solucionó en Tuleap Community Edition versión 15.7.99.6 y Tuleap Enterprise Edition 15.7-2, 15.6-5, 15.5-6, 15.4-8, 15.3-6, 15.2-5, 15.1-9, 15.0-9 y 14.12. -6."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L","baseScore":7.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-440"},{"lang":"en","value":"CWE-670"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionStartIncluding":"14.11.99.34 ","versionEndExcluding":"15.7.99.6","matchCriteriaId":"7ABA9252-EF9D-4BD2-98DB-4FCF5B2037B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"14.12-1","versionEndExcluding":"14.12-6","matchCriteriaId":"ACE0DEB1-102A-44EE-8217-E1D489080FAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.0-1","versionEndExcluding":"15.0-9","matchCriteriaId":"BB5542D6-16D4-407A-BCFC-32C96219F20E"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.1-1","versionEndExcluding":"15.1-9","matchCriteriaId":"FA862976-6285-4A88-8D47-66AA341405EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.2-1","versionEndExcluding":"15.2-5","matchCriteriaId":"2AE18296-FDFC-4A94-A245-35A98637A151"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.3-1","versionEndExcluding":"15.3-6","matchCriteriaId":"AF0788F9-2729-418B-8761-843325A40FF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.4-1","versionEndExcluding":"15.4-8","matchCriteriaId":"7AADD7EC-A8D9-4202-848C-AAA5B0F37CC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.5-1","versionEndExcluding":"15.5-6","matchCriteriaId":"4BD949BE-FE7B-46F6-8E31-C4ACDF6EE508"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.6-1","versionEndExcluding":"15.6-5","matchCriteriaId":"180691C4-B2E2-4387-9AB5-8A8678A984AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:15.7-1:*:*:*:enterprise:*:*:*","matchCriteriaId":"791E4104-6EB7-409D-9BF3-08D6AEFCFEEC"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a0ba0ae82a29eb8bfacef286778e5e49954f5316","source":"security-advisories@github.com","tags":["Permissions Required"]},{"url":"https://tuleap.net/plugins/tracker/?aid=37545","source":"security-advisories@github.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a0ba0ae82a29eb8bfacef286778e5e49954f5316","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required"]},{"url":"https://tuleap.net/plugins/tracker/?aid=37545","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]}]}}]}