Lucene search

K
cve[email protected]CVE-2022-39233
HistoryOct 19, 2022 - 11:15 a.m.

CVE-2022-39233

2022-10-1911:15:11
CWE-862
web.nvd.nist.gov
26
2
tuleap
software development
collaboration
cve-2022-39233
gitlab
authorization
security patch

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.9%

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint PATCH /gitlab_repositories/{id}. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds.

Affected configurations

Vulners
NVD
Node
enaleantuleapRange12.9.99.22814.0.99.24
VendorProductVersionCPE
enaleantuleap*cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Enalean",
    "product": "tuleap",
    "versions": [
      {
        "version": ">= 12.9.99.228, < 14.0.99.24",
        "status": "affected"
      }
    ]
  }
]

Social References

More

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.9%

Related for CVE-2022-39233