CVE-2024-47767

4.3 MEDIUM

📋 TL;DR

This vulnerability in Tuleap allows users to see tracker names they should not have access to due to improper handling of permissions. It affects all Tuleap Community and Enterprise Edition users running vulnerable versions. The issue is an information disclosure vulnerability that could expose sensitive project or organizational data.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: Tuleap Community Edition < 15.13.99.113, Tuleap Enterprise Edition < 15.13-5, Tuleap Enterprise Edition < 15.12-8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with tracker functionality are affected. The vulnerability exists in the permission checking logic for tracker name visibility.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map organizational structure, identify sensitive projects, and use this information for social engineering or targeted attacks against specific teams or individuals.

🟠

Likely Case

Users accidentally or intentionally viewing tracker names for projects they shouldn't have access to, potentially revealing project existence, team structures, or development activities.

🟢

If Mitigated

Limited exposure of tracker names only, without access to actual tracker content, data, or project details.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access. The vulnerability is in the UI/permission logic rather than a direct API or network-level issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Tuleap Community Edition 15.13.99.113, Tuleap Enterprise Edition 15.13-5, Tuleap Enterprise Edition 15.12-8

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-j342-v27q-329v

Restart Required: Yes

Instructions:

1. Backup your Tuleap installation and database. 2. Update to the patched version using your distribution's package manager or Tuleap upgrade process. 3. Restart Tuleap services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict user access

all

Temporarily limit user permissions and access to minimize exposure while planning upgrade.

🧯 If You Can't Patch

  • Implement strict access controls and audit user permissions regularly
  • Monitor for unusual access patterns to tracker listings and implement additional logging

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface admin panel or run: tuleap version

Check Version:

tuleap version

Verify Fix Applied:

Verify version is patched and test that users cannot see tracker names for projects they lack permissions to access.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to tracker listings
  • Users accessing tracker names outside their normal project scope

Network Indicators:

  • Increased requests to tracker listing endpoints from unauthorized users

SIEM Query:

source="tuleap" AND (event="tracker_access" OR event="permission_check") AND result="success" WHERE user NOT IN authorized_users

🔗 References

📤 Share & Export