CVE-2025-24029
📋 TL;DR
CVE-2025-24029 is an improper permissions vulnerability in Tuleap that allows users (including anonymous users in public project dashboards) to access artifacts they shouldn't have permission to view. This affects Tuleap Community and Enterprise Editions before specific patched versions. The vulnerability enables unauthorized information disclosure of sensitive project artifacts.
💻 Affected Systems
- Tuleap Community Edition
- Tuleap Enterprise Edition
📦 What is this software?
Tuleap by Enalean
Tuleap by Enalean
Tuleap by Enalean
⚠️ Risk & Real-World Impact
Worst Case
Anonymous users could access confidential project artifacts containing sensitive intellectual property, financial data, or personally identifiable information from public project dashboards.
Likely Case
Unauthorized users gain access to project artifacts they shouldn't see, potentially exposing internal development plans, bug reports, or project management details.
If Mitigated
With proper access controls and network segmentation, impact is limited to authorized users accessing slightly broader artifact sets than intended.
🎯 Exploit Status
Exploitation requires accessing specific dashboard widgets; no authentication needed for public project dashboards.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Tuleap Community Edition 16.3.99.1737562605, Tuleap Enterprise Edition 16.3-5, or Tuleap Enterprise Edition 16.2-7
Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9
Restart Required: Yes
Instructions:
1. Backup your Tuleap instance and database. 2. Update Tuleap using your distribution's package manager (apt/yum). 3. Run 'tuleap-cfg site-deploy' as root. 4. Restart Tuleap services: 'systemctl restart tuleap'.
🧯 If You Can't Patch
- Disable public access to all project dashboards in Tuleap configuration.
- Remove or restrict artifact-related widgets from all project dashboards.
🔍 How to Verify
Check if Vulnerable:
Check Tuleap version via web interface Admin > System Info or command line: 'cat /usr/share/tuleap/VERSION'
Check Version:
cat /usr/share/tuleap/VERSION
Verify Fix Applied:
Verify version is 16.3.99.1737562605 or higher for Community Edition, or 16.3-5/16.2-7 or higher for Enterprise Edition
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to artifact endpoints from unauthenticated IPs
- Access denied errors followed by successful artifact access
Network Indicators:
- HTTP requests to /plugins/tracker/ endpoints from unauthorized sources
SIEM Query:
source="tuleap" AND (uri_path="/plugins/tracker/*" AND (user="anonymous" OR user="-"))
🔗 References
- https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9
- https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=269cbaa73bac6d1c50674c48c9987263f2b38804
- https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a97480f951351c0f8f2f3f27f7daa3f7f9c37c75
- https://tuleap.net/plugins/tracker/?aid=41476