{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T21:43:44.759","vulnerabilities":[{"cve":{"id":"CVE-2024-39902","sourceIdentifier":"security-advisories@github.com","published":"2024-07-22T14:15:06.383","lastModified":"2025-04-10T17:45:08.717","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Tuleap is an open source suite to improve management of software developments and collaboration. Prior to Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8, the checkbox \"Apply same permissions to all sub-items of this folder\" in the document manager permissions modal is not taken into account and always considered as unchecked. In situations where the permissions are being restricted some users might still keep, incorrectly, the possibility to edit or manage items. Only change made via the web UI are affected, changes directly made via the REST API are not impacted. This vulnerability is fixed in Tuleap Community Edition 15.10.99.128 and Tuleap Enterprise Edition 15.10-6 and 15.9-8."},{"lang":"es","value":"Tuleap es una suite de código abierto para mejorar la gestión de los desarrollos de software y la colaboración. Antes de Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8, la casilla de verificación \"Apply same permissions to all sub-items of this folder\" en el modo de permisos del administrador de documentos no se tiene en cuenta y siempre se considera como desmarcada. En situaciones en las que se restringen los permisos, es posible que algunos usuarios aún mantengan, incorrectamente, la posibilidad de editar o administrar elementos. Solo se ven afectados los cambios realizados a través de la interfaz de usuario web; los cambios realizados directamente a través de la API REST no se ven afectados. Esta vulnerabilidad se solucionó en Tuleap Community Edition 15.10.99.128 y Tuleap Enterprise Edition 15.10-6 y 15.9-8."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.5,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-281"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-281"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"15.9-8","matchCriteriaId":"BAD0BC26-272E-40BA-85A1-76079EFDC305"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*","versionEndExcluding":"15.10.99.128","matchCriteriaId":"4442E90B-4840-4E66-800A-451533E638E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"15.10","versionEndExcluding":"15.10-6","matchCriteriaId":"A33A0CAA-11FD-4A54-8881-3C6C4191F70F"}]}]}],"references":[{"url":"https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://tuleap.net/plugins/tracker/?aid=38675","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/Enalean/tuleap/commit/580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/Enalean/tuleap/security/advisories/GHSA-5jq5-vxmq-xrj7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=580161e8a065fba30ca5ca1f6f1bdb4f4b1424bb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://tuleap.net/plugins/tracker/?aid=38675","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}