Lucene search

K
nvd[email protected]NVD:CVE-2022-39233
HistoryOct 19, 2022 - 11:15 a.m.

CVE-2022-39233

2022-10-1911:15:11
CWE-862
web.nvd.nist.gov
5
tuleap
gitlab
authorization
bypass
patch

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

31.9%

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions 12.9.99.228 and above, prior to 14.0.99.24, authorizations are not properly verified when updating the branch prefix used by the GitLab repository integration. Authenticated users can change the branch prefix of any of the GitLab repository integration they can see vie the REST endpoint PATCH /gitlab_repositories/{id}. This action should be restricted to Git administrators. This issue is patched in Tuleap Community Edition 14.0.99.24 and Tuleap Enterprise Edition 14.0-3. There are no known workarounds.

Affected configurations

NVD
Node
enaleantuleapRange12.9.99.22814.0.99.24community
OR
enaleantuleapRange12.1013.12-6enterprise
OR
enaleantuleapRange14.014.0-3enterprise

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

31.9%

Related for NVD:CVE-2022-39233