Tuleap does not sanitize properly user settings when constructing the SQL query to browse and search commits in the CVS repositories.
Impact
A authenticated malicious user with read access to a CVS repository could execute arbitrary SQL queries.
CVSSv3.1 score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation
- Go to a project with a CVS service
- Set the user preferences
commits_browcust<project_id>
to something like |100|100|100||A
- Go to
/cvs/?func=browse&group_id=<project_id>
- Take a look at the executed query/MySQL warnings
References
CWE 89
OWASP SQL Injection
CVE-2021-43806