CVE-2025-64498

4.6 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in Tuleap project management software that allows attackers to trick authenticated users into changing tracker general settings without their consent. It affects Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7, and 16.12-10. Attackers can exploit this by luring victims to malicious websites while they're logged into Tuleap.

💻 Affected Systems

Products:
  • Tuleap Community Edition
  • Tuleap Enterprise Edition
Versions: Community Edition: < 17.0.99.1762444754; Enterprise Edition: < 17.0-2, < 16.13-7, < 16.12-10
Operating Systems: All platforms running Tuleap
Default Config Vulnerable: ⚠️ Yes
Notes: All Tuleap installations with affected versions are vulnerable regardless of configuration. The vulnerability requires users to be authenticated and tricked into visiting malicious sites.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify tracker configurations to disrupt project workflows, alter data collection forms, change permissions, or redirect data to unauthorized locations, potentially causing operational disruption and data integrity issues.

🟠

Likely Case

Attackers trick users into making unintended changes to tracker settings, which could lead to misconfigured workflows, altered data validation rules, or changed notification settings affecting project management processes.

🟢

If Mitigated

With proper CSRF protections and user awareness, the impact is limited to minor configuration changes that can be detected and reverted by administrators.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users into visiting malicious websites. The technical complexity is low as it's a standard CSRF attack pattern.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Community Edition: 17.0.99.1762444754; Enterprise Edition: 17.0-2, 16.13-7, 16.12-10

Vendor Advisory: https://github.com/Enalean/tuleap/security/advisories/GHSA-vxfh-h8p6-p5rg

Restart Required: Yes

Instructions:

1. Backup your Tuleap installation and database. 2. Update to the patched version using your distribution's package manager or Tuleap upgrade process. 3. Restart Tuleap services. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Implement CSRF Protection Headers

linux

Add Content Security Policy headers to help prevent CSRF attacks

# Add to web server configuration (Apache example):
Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'"

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies for Tuleap sessions
  • Educate users about the risks of clicking unknown links while logged into Tuleap

🔍 How to Verify

Check if Vulnerable:

Check Tuleap version via web interface (Admin > System Info) or command line: cat /etc/tuleap/conf/VERSION

Check Version:

cat /etc/tuleap/conf/VERSION

Verify Fix Applied:

Verify version is equal to or higher than patched versions: Community Edition >= 17.0.99.1762444754; Enterprise Edition >= 17.0-2 or >= 16.13-7 or >= 16.12-10

📡 Detection & Monitoring

Log Indicators:

  • Unusual tracker setting changes from unexpected IP addresses
  • Multiple tracker configuration changes in short timeframes
  • User sessions with unexpected referrer headers

Network Indicators:

  • HTTP requests to tracker settings endpoints with missing or malformed CSRF tokens
  • Requests from external domains to Tuleap tracker endpoints

SIEM Query:

source="tuleap_access.log" AND (uri="/plugins/tracker/admin" OR uri CONTAINS "/plugins/tracker/") AND (http_referer NOT CONTAINS "your-tuleap-domain.com" OR csrf_token="")

🔗 References

📤 Share & Export