CVE-2025-50179

4.6 MEDIUM

📋 TL;DR

This CVE describes a cross-site request forgery (CSRF) vulnerability in Tuleap that allows attackers to trick authenticated users into modifying canned responses. The vulnerability affects Tuleap Community Edition prior to version 16.8.99.1749830289 and Tuleap Enterprise Edition prior to version 16.9-1. Attackers can exploit this by getting victims to visit malicious web pages while logged into Tuleap.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: Community Edition: < 16.8.99.1749830289, Enterprise Edition: < 16.9-1
Operating Systems: All platforms running Tuleap
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability affects the canned responses feature which is available in standard Tuleap installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could modify all canned responses in the system, potentially altering standard communication templates, inserting malicious content, or disrupting workflow processes.

🟠

Likely Case

Attackers modify specific canned responses to insert phishing links, malicious instructions, or inappropriate content that gets distributed through normal Tuleap workflows.

🟢

If Mitigated

With proper CSRF protections and user awareness training, the impact is limited to minor content modifications that can be quickly detected and reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated to Tuleap and visit a malicious webpage. The attack leverages standard CSRF techniques without requiring special privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Community Edition: 16.8.99.1749830289, Enterprise Edition: 16.9-1

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-rxpm-g7gw-4mrv

Restart Required: Yes

Instructions:

1. Backup your Tuleap instance and database. 2. Update Tuleap using your package manager (apt/yum). 3. Run 'tuleap-cfg site-deploy' to apply changes. 4. Restart Tuleap services. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

CSRF Token Validation

all

Implement custom CSRF token validation for canned response modifications if immediate patching isn't possible.

# Requires custom plugin development - no simple command

Restrict Canned Response Access

all

Limit which users can modify canned responses to reduce attack surface.

# Configure through Tuleap web interface: Admin > Permissions

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts targeting canned response endpoints
  • Educate users about CSRF risks and advise them to log out of Tuleap when browsing untrusted websites

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface (Admin > System Info) or command line: 'tuleap version'

Check Version:

tuleap version

Verify Fix Applied:

Verify version is at least Community Edition 16.8.99.1749830289 or Enterprise Edition 16.9-1, then test canned response modification with CSRF testing tools

📡 Detection & Monitoring

Log Indicators:

  • Multiple canned response modifications from same user in short timeframe
  • Canned response modifications from unexpected user agents or IP addresses

Network Indicators:

  • HTTP POST requests to /plugins/tracker_canned_response/ endpoints without proper Referer headers
  • Requests with missing or invalid CSRF tokens

SIEM Query:

source="tuleap" AND (uri_path="/plugins/tracker_canned_response/" AND http_method="POST") | stats count by src_ip, user

🔗 References

📤 Share & Export