CVE-2021-41154

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers with read access to SVN core repositories in Tuleap to execute arbitrary SQL queries through SQL injection. It affects Tuleap Community and Enterprise Editions before specific patched versions. Attackers could potentially read, modify, or delete database content.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: All versions before Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, and Tuleap Enterprise Edition 11.16-7
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have read access to SVN core repositories. The vulnerability is in the SVN repository access component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data manipulation, privilege escalation, or full system takeover via subsequent attacks.

🟠

Likely Case

Unauthorized data access and potential data exfiltration from Tuleap databases, including sensitive project information and user data.

🟢

If Mitigated

Limited impact with proper access controls, but still potential for data leakage from accessible database tables.

🌐 Internet-Facing: HIGH if Tuleap instance is internet-facing and SVN repositories are accessible to external users.
🏢 Internal Only: MEDIUM as it requires authenticated read access to SVN repositories, but internal attackers could exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated read access to SVN repositories. SQL injection vulnerabilities are typically straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 11.17.99.144, Tuleap Enterprise Edition 11.17-5, Tuleap Enterprise Edition 11.16-7

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-6462-gfv9-jf83

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance and database. 2. Update to the patched version using your distribution's package manager or Tuleap upgrade process. 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict SVN Repository Access

all

Limit read access to SVN core repositories to only trusted users who absolutely need it.

# Use Tuleap web interface to modify repository permissions
# Navigate to Project Admin > SVN > Access Control

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Tuleap instances from sensitive systems
  • Enforce principle of least privilege for all user accounts with SVN repository access

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface or command line. If version is below patched versions listed above, the system is vulnerable.

Check Version:

On Tuleap server: /usr/share/tuleap/src/utils/php-launcher.sh /usr/share/tuleap/src/utils/display_tuleap_version.php

Verify Fix Applied:

Verify Tuleap version is equal to or higher than the patched versions. Test SVN repository access functionality to ensure it works normally.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed SVN access attempts followed by successful access
  • Unexpected database operations from Tuleap application user

Network Indicators:

  • Unusual database connection patterns from Tuleap application server
  • Large data transfers from Tuleap database

SIEM Query:

source="tuleap_logs" AND ("SQL error" OR "database error" OR "unexpected query")

🔗 References

📤 Share & Export