{"api_version":"1","generated_at":"2026-04-25T03:04:29+00:00","cve":"CVE-2022-31128","urls":{"html":"https://cve.report/CVE-2022-31128","api":"https://cve.report/api/cve/CVE-2022-31128.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-31128","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-31128"},"summary":{"title":"CVE-2022-31128","description":"Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-08-01 17:15:00","updated_at":"2022-08-06 02:42:00"},"problem_types":["CWE-862"],"metrics":[],"references":[{"url":"https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33","name":"https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33","refsource":"MISC","tags":[],"title":"fix: Fine grained permissions must be well handled in POST git/:id/br… · Enalean/tuleap@58ecb1d · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=58ecb1dee1c46075d3e089980301ebfbe0bafd33","name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=58ecb1dee1c46075d3e089980301ebfbe0bafd33","refsource":"MISC","tags":[],"title":"Git - Tuleap","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://tuleap.net/plugins/tracker/?aid=27538","name":"https://tuleap.net/plugins/tracker/?aid=27538","refsource":"MISC","tags":[],"title":"Fine grained permissions are not checked when creating a branch  - request #27538 - Requests - Tuleap","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79","name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79","refsource":"CONFIRM","tags":[],"title":"Fine grained permissions are not checked when creating a branch with the REST API · Advisory · Enalean/tuleap · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-31128","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31128","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"31128","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"enalean","cpe5":"tuleap","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"community","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"31128","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"enalean","cpe5":"tuleap","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-31128","STATE":"PUBLIC","TITLE":"Fine grained permissions are not checked in Tuleap"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"tuleap","version":{"version_data":[{"version_value":">= >= 13.9.99.110, < 13.10.99.82"}]}}]},"vendor_name":"Enalean"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Community Edition as well as in version 13.10-3 of Tuleap Enterprise Edition. Users are advised to upgrade. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862: Missing Authorization"}]}]},"references":{"reference_data":[{"name":"https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79","refsource":"CONFIRM","url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-2p49-vgcx-5w79"},{"name":"https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33","refsource":"MISC","url":"https://github.com/Enalean/tuleap/commit/58ecb1dee1c46075d3e089980301ebfbe0bafd33"},{"name":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=58ecb1dee1c46075d3e089980301ebfbe0bafd33","refsource":"MISC","url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=58ecb1dee1c46075d3e089980301ebfbe0bafd33"},{"name":"https://tuleap.net/plugins/tracker/?aid=27538","refsource":"MISC","url":"https://tuleap.net/plugins/tracker/?aid=27538"}]},"source":{"advisory":"GHSA-2p49-vgcx-5w79","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-08-01 17:15:00","lastModifiedDate":"2022-08-06 02:42:00","problem_types":["CWE-862"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"13.10","versionEndExcluding":"13.10-3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionStartIncluding":"13.9.9.110","versionEndExcluding":"13.10.99.82","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}