fkie_cve-2024-39902
Vulnerability from fkie_nvd
Published
2024-07-22 14:15
Modified
2025-04-10 17:45
Severity ?
4.8 (Medium) - CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox "Apply same permissions to all sub-items of this folder" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "BAD0BC26-272E-40BA-85A1-76079EFDC305", "versionEndExcluding": "15.9-8", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "matchCriteriaId": "4442E90B-4840-4E66-800A-451533E638E3", "versionEndExcluding": "15.10.99.128", "vulnerable": true }, { "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A33A0CAA-11FD-4A54-8881-3C6C4191F70F", "versionEndExcluding": "15.10-6", "versionStartIncluding": "15.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8." }, { "lang": "es", "value": "Tuleap es una suite de c\u00f3digo abierto para mejorar la gesti\u00f3n de los desarrollos de software y la colaboraci\u00f3n. Antes de Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8, la casilla de verificaci\u00f3n \"Apply same permissions to all sub-items of this folder\" en el modo de permisos del administrador de documentos no se tiene en cuenta y siempre se considera como desmarcada. En situaciones en las que se restringen los permisos, es posible que algunos usuarios a\u00fan mantengan, incorrectamente, la posibilidad de editar o administrar elementos. Solo se ven afectados los cambios realizados a trav\u00e9s de la interfaz de usuario web; los cambios realizados directamente a trav\u00e9s de la API REST no se ven afectados. Esta vulnerabilidad se solucion\u00f3 en Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8." } ], "id": "CVE-2024-39902", "lastModified": "2025-04-10T17:45:08.717", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-22T14:15:06.383", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit\u0026h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tuleap.net/plugins/tracker/?aid=38675" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-281" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…