Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31128: CWE-862: Missing Authorization in Enalean tuleap

0
Medium
Published: Mon Aug 01 2022 (08/01/2022, 16:20:13 UTC)
Source: CVE
Vendor/Project: Enalean
Product: tuleap

Description

Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 01:36:00 UTC

Technical Analysis

CVE-2022-31128 is a security vulnerability identified in Enalean's Tuleap software, an open-source suite designed to facilitate software development management and collaboration. The vulnerability stems from a missing authorization check (CWE-862) in the REST API endpoint responsible for creating Git branches (`POST git/:id/branches`). Specifically, in affected versions of Tuleap (versions >= 13.9.99.110 and < 13.10.99.82), the system fails to properly verify whether a user has the necessary permissions to create branches within Git repositories that use fine-grained permission controls. This flaw allows any authenticated user, regardless of their assigned repository permissions, to create branches via the REST API. The ability to create branches without proper authorization can undermine repository integrity and potentially facilitate unauthorized code changes or the introduction of malicious code. The issue was resolved in Tuleap Community Edition version 13.10.99.82 and Tuleap Enterprise Edition version 13.10-3. No known workarounds exist, so upgrading to a fixed version is the primary remediation. There are no reports of active exploitation in the wild as of the publication date. The vulnerability does not require user interaction beyond authentication, but it does require the attacker to have some level of access to the Tuleap instance (authenticated user).

Potential Impact

For European organizations utilizing Tuleap for software development and collaboration, this vulnerability poses a risk to the integrity and trustworthiness of their source code repositories. Unauthorized branch creation can lead to unauthorized code changes, potentially introducing vulnerabilities, backdoors, or other malicious modifications into the development lifecycle. This can compromise the integrity of software products, disrupt development workflows, and increase the risk of supply chain attacks. Organizations in sectors with high regulatory and compliance requirements (e.g., finance, healthcare, critical infrastructure) may face increased risk due to potential violations of software integrity and audit requirements. Additionally, the vulnerability could be leveraged by insider threats or compromised accounts to escalate privileges within the development environment. Although the vulnerability does not directly affect confidentiality or availability, the integrity impact is significant, especially in environments where code integrity is critical. The lack of known exploits reduces immediate risk, but the presence of the vulnerability in widely used versions means organizations should act promptly to mitigate potential future exploitation.

Mitigation Recommendations

1. Immediate Upgrade: Organizations should upgrade affected Tuleap instances to version 13.10.99.82 (Community Edition) or 13.10-3 (Enterprise Edition) or later to apply the official patch that enforces proper authorization checks. 2. Access Control Review: Conduct a thorough review of user permissions and roles within Tuleap to ensure that only trusted users have access to repository management features. 3. API Usage Monitoring: Implement monitoring and logging of REST API calls, especially branch creation events, to detect any unauthorized or anomalous activity. 4. Network Segmentation: Restrict access to the Tuleap instance’s API endpoints to trusted networks and users, reducing the attack surface. 5. Multi-Factor Authentication (MFA): Enforce MFA for all users accessing Tuleap to reduce the risk of compromised credentials being used to exploit this vulnerability. 6. Incident Response Preparedness: Develop and test incident response plans specific to source code repository integrity breaches, including rollback procedures and forensic analysis. 7. Security Awareness: Educate developers and administrators about the risks of unauthorized branch creation and encourage vigilance in code review processes to detect suspicious changes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf387a

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 1:36:00 AM

Last updated: 2/7/2026, 2:06:29 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats