Vulnerabilites related to atlassian - sourcetree
Vulnerability from fkie_nvd
Published
2017-05-04 22:29
Modified
2025-04-20 01:37
Severity ?
Summary
Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/05/03/5 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://seclists.org/fulldisclosure/2017/May/10 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/98329 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.youtube.com/watch?v=SQ1_Ht-0Bdo | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/05/03/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/May/10 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/98329 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.youtube.com/watch?v=SQ1_Ht-0Bdo | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AE000A-12B4-49C4-B1CB-C0361C4292CB", "versionEndIncluding": "2.5c", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632." }, { "lang": "es", "value": "Atlassian SourceTree v2.5c y versiones anteriores se ven afectados por una inyecci\u00f3n de comandos en el \u00e1rbol de directorios :// scheme. Esto conducir\u00e1 a una ejecuci\u00f3n arbitraria de comandos de SO en el \u00e1rbol de directorios de una subcadena URL ://cloneRepo/ext:: o ://checkoutRef/ext:: seguido por el comando. El n\u00famero de identificaci\u00f3n de Atlassian es SRCTREE-4632." } ], "id": "CVE-2017-8768", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-04T22:29:00.197", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/05/03/5" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/May/10" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98329" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/05/03/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/May/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-16 18:15
Modified
2025-05-12 16:15
Severity ?
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15
See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives).
This vulnerability was reported via our Penetration Testing program.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380 | Vendor Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREE-8076 | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * | |
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5B6BE8EF-BAC2-41E9-9D16-A4E99BCF6E58", "versionEndExcluding": "3.4.15", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", "matchCriteriaId": "BFD4799A-F207-47AF-8840-5921E43CF365", "versionEndExcluding": "4.2.5", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. \r\n\t\r\n\tThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. \r\n\t\r\n\tAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n\t\t\r\n\t\tSourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15\r\n\t\t\r\n\t\t\r\n\t\r\n\tSee the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). \r\n\t\r\n\tThis vulnerability was reported via our Penetration Testing program." }, { "lang": "es", "value": "Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) de alta gravedad se introdujo en la versi\u00f3n 3.4.14 de Sourcetree para Mac y Sourcetree para Windows. Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE), con una puntuaci\u00f3n CVSS de 7,8 y un vector CVSS de: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, permite a un atacante no autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac y Sourcetree para Windows 3.4: Actualice a una versi\u00f3n posterior o igual a la 3.4.15. Consulte las notas de la versi\u00f3n (https://www.sourcetreeapp.com/download-archives). Puede descargar la \u00faltima versi\u00f3n de Sourcetree para Mac y Windows desde el centro de descargas (https://www.sourcetreeapp.com/download-archives). Esta vulnerabilidad se report\u00f3 a trav\u00e9s de nuestro programa de pruebas de penetraci\u00f3n." } ], "id": "CVE-2023-22514", "lastModified": "2025-05-12T16:15:19.873", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security@atlassian.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-16T18:15:09.170", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-8076" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-05 22:29
Modified
2024-11-21 03:47
Severity ?
Summary
There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREEWIN-9077 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREEWIN-9077 | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A1E8D9C5-F370-4976-97CA-A8A854D7FA5D", "versionEndExcluding": "3.0.0", "versionStartIncluding": "0.5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." }, { "lang": "es", "value": "Hay una vulnerabilidad de inyecci\u00f3n de argumentos en Sourcetree para Windows desde la versi\u00f3n 0.5.1.0 hasta la 3.0.0 mediante los subrepositorios de Git en los repositorios de Mercurial. Un atacante con permisos para realizar commits en un repositorio vinculado a Sourcetree para Windows puede explotar este problema para ejecutar c\u00f3digo en el sistema." } ], "id": "CVE-2018-13397", "lastModified": "2024-11-21T03:47:01.483", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-05T22:29:00.313", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-9077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-9077" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-04-25 21:29
Modified
2024-11-21 04:08
Severity ?
Summary
There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREEWIN-8509 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREEWIN-8509 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "82FB1F11-A3B3-4D33-AEF3-E18E44069B08", "versionEndExcluding": "2.5.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability." }, { "lang": "es", "value": "Hab\u00eda una vulnerabilidad de inyecci\u00f3n de argumentos en Sourcetree para Windows mediante un nombre de etiqueta de repositorio Mercurial que va a eliminarse. Un atacante con permisos para crear una etiqueta en un repositorio Mercurial vinculado a Sourcetree para Windows puede explotar este problema para ejecutar c\u00f3digo en el sistema. Todas las versiones de Sourcetree para Windows anteriores a la 2.5.5.0 se han visto afectadas por esta vulnerabilidad." } ], "id": "CVE-2018-5226", "lastModified": "2024-11-21T04:08:22.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-25T21:29:00.467", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8509" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-14 14:29
Modified
2024-11-21 04:21
Severity ?
Summary
An argument injection vulnerability in Atlassian Sourcetree for Windows's URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREEWIN-11917 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREEWIN-11917 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "4BB196C2-BD2D-4CF4-8EF2-8747F7F8975F", "versionEndExcluding": "3.1.3", "versionStartIncluding": "0.5a", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An argument injection vulnerability in Atlassian Sourcetree for Windows\u0027s URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n argumental en los controladores de URI de Atlassian Sourcetree para Windows, en todas las versiones anteriores a 3.1.3, permite a los atacantes remotos conseguir la ejecuci\u00f3n de c\u00f3digo remota mediante el uso de un URI creado." } ], "id": "CVE-2019-11582", "lastModified": "2024-11-21T04:21:23.097", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-14T14:29:00.483", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11917" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11917" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-26 02:29
Modified
2024-11-21 03:13
Severity ?
Summary
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/102926 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html | Third Party Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREEWIN-8256 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102926 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREEWIN-8256 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "3979D87B-78E1-48DA-A9FA-319E7B72FF74", "versionEndExcluding": "2.4.7.0", "versionStartIncluding": "0.5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability" }, { "lang": "es", "value": "Sourcetree para Windows ten\u00eda varios errores de inyecci\u00f3n de argumentos y comandos en Mercurial y la gesti\u00f3n de repositorios Git. Un atacante con permisos para realizar commits en un repositorio vinculado a Sourcetree para Windows puede explotar este problema para ejecutar c\u00f3digo en el sistema. Desde la versi\u00f3n 0.8.4b de Sourcetree para Windows, esta vulnerabilidad puede desencadenarse desde una p\u00e1gina web mediante el uso del manipulador de URI de Sourcetree. Las versiones de Sourcetree para Windows desde la 0.5.1.0 y anteriores a la 2.4.7.0 se han visto afectadas por esta vulnerabilidad." } ], "id": "CVE-2017-14593", "lastModified": "2024-11-21T03:13:10.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-26T02:29:02.377", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102926" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8256" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-08 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E7E72B27-F2CE-482C-A2E6-87283A958FA1", "versionEndExcluding": "3.1.1", "versionStartIncluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." }, { "lang": "es", "value": "Hay una vulnerabilidad de inyecci\u00f3n de argumentos en Atlassian Sourcetree para macOS, desde la versi\u00f3n 1.2 hasta la versi\u00f3n 3.1.1, mediante nombres de archivos en repositorios Mercurial. Un atacante remoto con permisos para realizar commits en un repositorio vinculado a Sourcetree para macOS puede explotar este problema para ejecutar c\u00f3digo en el sistema." } ], "id": "CVE-2018-20234", "lastModified": "2024-11-21T04:01:08.287", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-08T18:29:00.240", "references": [ { "source": "security@atlassian.com", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "security@atlassian.com", "url": "http://www.securityfocus.com/bid/107414" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-6391" }, { "source": "security@atlassian.com", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/107414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-6391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Mar/30" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-08 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7C4F03AA-02DC-461D-89DE-6FFA1EDCA825", "versionEndExcluding": "3.0.10", "versionStartIncluding": "0.5a", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system." }, { "lang": "es", "value": "Hab\u00eda una vulnerabilidad de inyecci\u00f3n de comandos en Sourcetree para Windows, desde la versi\u00f3n 0.5a hasta la 3.0.10, mediante la gesti\u00f3n de URI. Un atacante remoto podr\u00eda enviar una URL maliciosa a una v\u00edctima que utiliza Sourcetree para Windows para explotar este fallo con el fin obtener la ejecuci\u00f3n de c\u00f3digo en el sistema." } ], "id": "CVE-2018-20236", "lastModified": "2024-11-21T04:01:08.513", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-08T18:29:00.320", "references": [ { "source": "security@atlassian.com", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107401" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11291" }, { "source": "security@atlassian.com", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Mar/30" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-24 13:29
Modified
2024-11-21 03:47
Severity ?
Summary
There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREEWIN-8884 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREEWIN-8884 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E069C397-9A9F-4519-8CFB-F1CA16B6E972", "versionEndExcluding": "2.6.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability." }, { "lang": "es", "value": "Hay una vulnerabilidad de inyecci\u00f3n de argumentos en Sourcetree para Windows mediante nombres de archivo en repositorios Mercurial. Un atacante con permisos para realizar commits en un repositorio vinculado a Sourcetree para Windows puede explotar este problema para ejecutar c\u00f3digo en el sistema. Todas las versiones de Sourcetree para Windows anteriores a la 2.6.9 se han visto afectadas por esta vulnerabilidad." } ], "id": "CVE-2018-13386", "lastModified": "2024-11-21T03:47:00.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-24T13:29:00.557", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8884" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-24 23:15
Modified
2025-07-30 13:05
Severity ?
Summary
This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac.
This ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives .
You can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives .
This vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE).
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREE-8217 | Vendor Advisory, Issue Tracking |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", "matchCriteriaId": "4A748740-3812-40B1-BAF9-3D0D26C780F9", "versionEndIncluding": "4.2.12", "versionStartIncluding": "4.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac.\n\nThis ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\u00a0\n\nAtlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives .\n\nYou can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives .\n\nThis vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE)." }, { "lang": "es", "value": "Esta vulnerabilidad ACE (ejecuci\u00f3n arbitraria de c\u00f3digo) de gravedad media se introdujo en la versi\u00f3n 4.2.8 de Sourcetree para Mac. Esta vulnerabilidad ACE (ejecuci\u00f3n arbitraria de c\u00f3digo), con una puntuaci\u00f3n CVSS de 5,9, permite a un atacante autenticado localmente ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacci\u00f3n del usuario. Atlassian recomienda a los usuarios de Sourcetree para Mac que actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas. Consulte las notas de la versi\u00f3n https://www.sourcetreeapp.com/download-archives. Puede descargar la \u00faltima versi\u00f3n de Sourcetree para Mac desde el centro de descargas https://www.sourcetreeapp.com/download-archives. Esta vulnerabilidad fue descubierta a trav\u00e9s del programa Atlassian Bug Bounty por Karol Mazurek (AFINE)." } ], "id": "CVE-2025-22165", "lastModified": "2025-07-30T13:05:24.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security@atlassian.com", "type": "Secondary" } ] }, "published": "2025-07-24T23:15:26.127", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory", "Issue Tracking" ], "url": "https://jira.atlassian.com/browse/SRCTREE-8217" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-11-05 22:29
Modified
2024-11-21 03:47
Severity ?
Summary
There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREE-5985 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREE-5985 | Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "022B1D50-4DC4-4CD7-ABA4-60B93406E9BB", "versionEndExcluding": "3.0.0", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta2:*:*:*:macos:*:*", "matchCriteriaId": "09C4E723-582A-476B-9872-989784007E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta3:*:*:*:macos:*:*", "matchCriteriaId": "DD53F970-5930-4FF8-BC06-E5E9AC08F015", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta4:*:*:*:macos:*:*", "matchCriteriaId": "47411DAA-1C4D-4F71-AB52-D5518721E844", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta5:*:*:*:macos:*:*", "matchCriteriaId": "88D8B733-2AEA-443E-9F88-20276C4FF2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:rc1:*:*:*:macos:*:*", "matchCriteriaId": "308AA208-CC76-45FE-B76C-FF4C7C3CF26E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." }, { "lang": "es", "value": "Hay una vulnerabilidad de inyecci\u00f3n de argumentos en Sourcetree para macOS desde la versi\u00f3n 1.0b2 hasta la 3.0.0 mediante los subrepositorios de Git en los repositorios de Mercurial. Un atacante con permisos para realizar commits en un repositorio Mercurial vinculado a Sourcetree para macOS puede explotar este problema para ejecutar c\u00f3digo en el sistema." } ], "id": "CVE-2018-13396", "lastModified": "2024-11-21T03:47:01.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-05T22:29:00.233", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5985" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-08 18:29
Modified
2024-11-21 04:01
Severity ?
Summary
There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A85EE0E7-CDE1-43CA-9F46-3A5DE4378F71", "versionEndExcluding": "3.0.15", "versionStartIncluding": "0.5a", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." }, { "lang": "es", "value": "Hay una vulnerabilidad de inyecci\u00f3n de argumentos en Atlassian Sourcetree para Windows, desde la versi\u00f3n 0.5a hasta la versi\u00f3n 3.0.15, mediante nombres de archivos en repositorios Mecurial. Un atacante remoto con permisos para realizar commits en un repositorio Mecurial vinculado a Sourcetree para Windows puede explotar este problema para ejecutar c\u00f3digo en el sistema." } ], "id": "CVE-2018-20235", "lastModified": "2024-11-21T04:01:08.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-08T18:29:00.273", "references": [ { "source": "security@atlassian.com", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107407" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11289" }, { "source": "security@atlassian.com", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Mar/30" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-19 19:15
Modified
2025-02-11 21:24
Severity ?
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9
Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20
See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).
This vulnerability was reported via our Penetration Testing program.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | 3.4.19 | |
atlassian | sourcetree | 4.2.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:3.4.19:*:*:*:*:windows:*:*", "matchCriteriaId": "B839C817-5C4C-4A68-A443-7DB09B8C837B", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:4.2.8:*:*:*:*:macos:*:*", "matchCriteriaId": "F04FBDBD-B558-4576-9D2D-3FE0860B4125", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9\r\n Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20\r\n\r\nSee the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).\r\n\r\nThis vulnerability was reported via our Penetration Testing program." }, { "lang": "es", "value": "Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) de gravedad alta se introdujo en las versiones 4.2.8 de Sourcetree para Mac y 3.4.19 de Sourcetree para Windows. Esta vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE), con una puntuaci\u00f3n CVSS de 8,8, permite a un atacante no autenticado ejecutar c\u00f3digo arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la \u00faltima versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac 4.2: actualice a una versi\u00f3n mayor o igual a la 4.2.9 Sourcetree para Windows 3.4: actualice a una versi\u00f3n mayor o igual a la 3.4.20 Consulte las notas de la versi\u00f3n ([https://www.sourcetreeapp.com/download-archives]). Puede descargar la \u00faltima versi\u00f3n de Sourcetree para Mac y Sourcetree para Windows desde el centro de descargas ([https://www.sourcetreeapp.com/download-archives]). Esta vulnerabilidad fue reportada a trav\u00e9s de nuestro programa de pruebas de penetraci\u00f3n." } ], "id": "CVE-2024-21697", "lastModified": "2025-02-11T21:24:33.417", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security@atlassian.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-19T19:15:07.937", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-8168" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-26 02:29
Modified
2024-11-21 03:13
Severity ?
Summary
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/102926 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html | Third Party Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREE-5243 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102926 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREE-5243 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", "matchCriteriaId": "3F24BC5B-A68B-4D43-8F75-19B7BFCF249F", "versionEndExcluding": "2.7", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta2:*:*:*:macos:*:*", "matchCriteriaId": "09C4E723-582A-476B-9872-989784007E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta3:*:*:*:macos:*:*", "matchCriteriaId": "DD53F970-5930-4FF8-BC06-E5E9AC08F015", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta4:*:*:*:macos:*:*", "matchCriteriaId": "47411DAA-1C4D-4F71-AB52-D5518721E844", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta5:*:*:*:macos:*:*", "matchCriteriaId": "88D8B733-2AEA-443E-9F88-20276C4FF2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:rc1:*:*:*:macos:*:*", "matchCriteriaId": "308AA208-CC76-45FE-B76C-FF4C7C3CF26E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability." }, { "lang": "es", "value": "Sourcetree para macOS ten\u00eda varios errores de inyecci\u00f3n de argumentos y comandos en Mercurial y la gesti\u00f3n de repositorios Git. Un atacante con permisos para realizar commits en un repositorio vinculado a Sourcetree para macOS puede explotar este problema para ejecutar c\u00f3digo en el sistema. Desde la versi\u00f3n 1.4.0 de Sourcetree para macOS, esta vulnerabilidad puede desencadenarse desde una p\u00e1gina web mediante el uso del manipulador de URI de Sourcetree. Las versiones de Sourcetree para macOS desde la 1.0b2 y anteriores a la 2.7.0 se han visto afectadas por esta vulnerabilidad." } ], "id": "CVE-2017-14592", "lastModified": "2024-11-21T03:13:09.977", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-26T02:29:02.313", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102926" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102926" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5243" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-24 13:29
Modified
2024-11-21 03:47
Severity ?
Summary
There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/SRCTREE-5846 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/SRCTREE-5846 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | sourcetree | * | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 | |
atlassian | sourcetree | 1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "BBD87F0A-0661-4E2E-BCA9-F03C28A0C459", "versionEndExcluding": "2.7.6", "versionStartIncluding": "1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta2:*:*:*:macos:*:*", "matchCriteriaId": "09C4E723-582A-476B-9872-989784007E27", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta3:*:*:*:macos:*:*", "matchCriteriaId": "DD53F970-5930-4FF8-BC06-E5E9AC08F015", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta4:*:*:*:macos:*:*", "matchCriteriaId": "47411DAA-1C4D-4F71-AB52-D5518721E844", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:beta5:*:*:*:macos:*:*", "matchCriteriaId": "88D8B733-2AEA-443E-9F88-20276C4FF2B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:1.0:rc1:*:*:*:macos:*:*", "matchCriteriaId": "308AA208-CC76-45FE-B76C-FF4C7C3CF26E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability." }, { "lang": "es", "value": "Hubo una vulnerabilidad de inyecci\u00f3n de argumentos en Sourcetree para macOS mediante nombres de archivos en repositorios Mercurial. Un atacante con permisos para realizar commits en un repositorio Mercurial vinculado a Sourcetree para macOS puede explotar este problema para ejecutar c\u00f3digo en el sistema. Las versiones de Sourcetree para macOS desde la 1.0b2 y anteriores a la 2.7.6 se han visto afectadas por esta vulnerabilidad." } ], "id": "CVE-2018-13385", "lastModified": "2024-11-21T03:47:00.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-24T13:29:00.497", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5846" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-88" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-5226 (GCVE-0-2018-5226)
Vulnerability from cvelistv5
Published
2018-04-25 21:00
Modified
2024-09-16 20:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- OS Command Injection
Summary
There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | SourceTree Windows |
Version: unspecified < 2.5.5.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:42.778Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8509" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SourceTree Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "2.5.5.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "OS Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-25T20:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8509" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-04-25T17:00:00", "ID": "CVE-2018-5226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SourceTree Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.5.5.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Sourcetree for Windows via Mercurial repository tag name that is going to be deleted. An attacker with permission to create a tag on a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. All versions of Sourcetree for Windows before 2.5.5.0 are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-8509", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8509" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-5226", "datePublished": "2018-04-25T21:00:00Z", "dateReserved": "2018-01-05T00:00:00", "dateUpdated": "2024-09-16T20:32:16.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8768 (GCVE-0-2017-8768)
Vulnerability from cvelistv5
Published
2017-05-04 22:00
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.865Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98329", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98329" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/05/03/5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/May/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-09T09:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "98329", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98329" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo" }, { "tags": [ "x_refsource_MISC" ], "url": "http://openwall.com/lists/oss-security/2017/05/03/5" }, { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/fulldisclosure/2017/May/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98329", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98329" }, { "name": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo", "refsource": "MISC", "url": "https://www.youtube.com/watch?v=SQ1_Ht-0Bdo" }, { "name": "http://openwall.com/lists/oss-security/2017/05/03/5", "refsource": "MISC", "url": "http://openwall.com/lists/oss-security/2017/05/03/5" }, { "name": "http://seclists.org/fulldisclosure/2017/May/10", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/May/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8768", "datePublished": "2017-05-04T22:00:00", "dateReserved": "2017-05-03T00:00:00", "dateUpdated": "2024-08-05T16:48:21.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14592 (GCVE-0-2017-14592)
Vulnerability from cvelistv5
Published
2018-01-26 02:00
Modified
2024-09-16 22:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- OS Command Injection
Summary
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for macOS |
Version: Versions starting with 1.0b2 before version 2.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:38.643Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5243" }, { "name": "102926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102926" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for macOS", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "Versions starting with 1.0b2 before version 2.7.0" } ] } ], "datePublic": "2018-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "OS Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-07T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5243" }, { "name": "102926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102926" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-24T00:00:00", "ID": "CVE-2017-14592", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for macOS", "version": { "version_data": [ { "version_value": "Versions starting with 1.0b2 before version 2.7.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREE-5243", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREE-5243" }, { "name": "102926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102926" }, { "name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-14592", "datePublished": "2018-01-26T02:00:00Z", "dateReserved": "2017-09-19T00:00:00", "dateUpdated": "2024-09-16T22:09:36.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21697 (GCVE-0-2024-21697)
Vulnerability from cvelistv5
Published
2024-11-19 19:00
Modified
2024-11-25 14:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- RCE (Remote Code Execution)
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9
Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20
See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).
This vulnerability was reported via our Penetration Testing program.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Atlassian | Sourcetree for Mac |
Version: All versions from 4.2.8 to 4.2.8 |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*" ], "defaultStatus": "unknown", "product": "sourcetree", "vendor": "atlassian", "versions": [ { "lessThan": "4.2.9", "status": "affected", "version": "4.2.8", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unknown", "product": "sourcetree", "vendor": "atlassian", "versions": [ { "lessThan": "3.4.20", "status": "affected", "version": "3.4.19", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21697", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-23T04:55:49.200583Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-25T14:04:49.167Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sourcetree for Mac", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "All versions from 4.2.8 to 4.2.8" }, { "status": "unaffected", "version": "All versions from 4.2.9" } ] }, { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "All versions from 3.4.19 to 3.4.19" }, { "status": "unaffected", "version": "All versions from 3.4.20" } ] } ], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9\r\n Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20\r\n\r\nSee the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).\r\n\r\nThis vulnerability was reported via our Penetration Testing program." } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-19T19:00:00.635Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091" }, { "url": "https://jira.atlassian.com/browse/SRCTREE-8168" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2024-21697", "datePublished": "2024-11-19T19:00:00.635Z", "dateReserved": "2024-01-01T00:05:33.848Z", "dateUpdated": "2024-11-25T14:04:49.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20236 (GCVE-0-2018-20236)
Vulnerability from cvelistv5
Published
2019-03-08 18:00
Modified
2024-09-16 19:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Command Injection
Summary
There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: 0.5a < unspecified Version: unspecified < 3.0.10 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:19.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "107401", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107401" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11291" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0.5a", "versionType": "custom" }, { "lessThan": "3.0.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-21T15:06:05", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "107401", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11291" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-06T00:00:00", "ID": "CVE-2018-20236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "0.5a" }, { "version_affected": "\u003c", "version_value": "3.0.10" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "107401", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107401" }, { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-11291", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11291" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20236", "datePublished": "2019-03-08T18:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T19:10:38.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13397 (GCVE-0-2018-13397)
Vulnerability from cvelistv5
Published
2018-11-05 22:00
Modified
2024-09-16 23:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: 0.5.1.0 < unspecified Version: unspecified < 3.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-9077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0.5.1.0", "versionType": "custom" }, { "lessThan": "3.0.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-05T21:57:02", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-9077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-10-31T00:00:00", "ID": "CVE-2018-13397", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "0.5.1.0" }, { "version_affected": "\u003c", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-9077", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-9077" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13397", "datePublished": "2018-11-05T22:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T23:11:19.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13386 (GCVE-0-2018-13386)
Vulnerability from cvelistv5
Published
2018-07-24 13:00
Modified
2024-09-16 23:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: unspecified < 2.6.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8884" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "2.6.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T12:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8884" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-07-18T00:00:00", "ID": "CVE-2018-13386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.6.9" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.9 are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-8884", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8884" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13386", "datePublished": "2018-07-24T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T23:56:52.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13396 (GCVE-0-2018-13396)
Vulnerability from cvelistv5
Published
2018-11-05 22:00
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for macOS |
Version: 1.0b2 < unspecified Version: unspecified < 3.0.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5985" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for macOS", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "1.0b2", "versionType": "custom" }, { "lessThan": "3.0.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-05T21:57:02", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5985" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-10-31T00:00:00", "ID": "CVE-2018-13396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for macOS", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "1.0b2" }, { "version_affected": "\u003c", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREE-5985", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREE-5985" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13396", "datePublished": "2018-11-05T22:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T21:03:34.200Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-14593 (GCVE-0-2017-14593)
Vulnerability from cvelistv5
Published
2018-01-26 02:00
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- OS Command Injection
Summary
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: Versions starting with 0.5.1.0 before version 2.4.7.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:38.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102926", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102926" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8256" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "Versions starting with 0.5.1.0 before version 2.4.7.0" } ] } ], "datePublic": "2018-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability" } ], "problemTypes": [ { "descriptions": [ { "description": "OS Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-07T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "102926", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102926" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8256" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-01-24T00:00:00", "ID": "CVE-2017-14593", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_value": "Versions starting with 0.5.1.0 before version 2.4.7.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "102926", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102926" }, { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-8256", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-8256" }, { "name": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-14593", "datePublished": "2018-01-26T02:00:00Z", "dateReserved": "2017-09-19T00:00:00", "dateUpdated": "2024-09-17T01:56:19.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11582 (GCVE-0-2019-11582)
Vulnerability from cvelistv5
Published
2019-06-14 13:54
Modified
2024-09-16 19:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
An argument injection vulnerability in Atlassian Sourcetree for Windows's URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: 0.5a < unspecified Version: unspecified < 3.1.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:55:41.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11917" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0.5a", "versionType": "custom" }, { "lessThan": "3.1.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An argument injection vulnerability in Atlassian Sourcetree for Windows\u0027s URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-14T13:54:38", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11917" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-06-05T17:00:00", "ID": "CVE-2019-11582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "0.5a" }, { "version_affected": "\u003c", "version_value": "3.1.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An argument injection vulnerability in Atlassian Sourcetree for Windows\u0027s URI handlers, in all versions prior to 3.1.3, allows remote attackers to gain remote code execution through the use of a crafted URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-11917", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11917" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-11582", "datePublished": "2019-06-14T13:54:38.881640Z", "dateReserved": "2019-04-29T00:00:00", "dateUpdated": "2024-09-16T19:25:35.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22514 (GCVE-0-2023-22514)
Vulnerability from cvelistv5
Published
2025-03-18 17:03
Modified
2025-05-12 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- RCE (Remote Code Execution)
Summary
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows.
This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15
See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives).
This vulnerability was reported via our Penetration Testing program.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Atlassian | Sourcetree for Mac |
Version: >= 3.4.14 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-22514", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-12T15:40:08.894218Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-12T15:40:34.777Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sourcetree for Mac", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 3.4.14" }, { "status": "affected", "version": "\u003e= 3.4.14" }, { "status": "unaffected", "version": "\u003e= 3.4.15" } ] }, { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 3.4.14" }, { "status": "affected", "version": "\u003e= 3.4.14" }, { "status": "unaffected", "version": "\u003e= 3.4.15" } ] } ], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. \r\n\t\r\n\tThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. \r\n\t\r\n\tAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n\t\t\r\n\t\tSourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15\r\n\t\t\r\n\t\t\r\n\t\r\n\tSee the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). \r\n\t\r\n\tThis vulnerability was reported via our Penetration Testing program." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T17:03:59.441Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380" }, { "url": "https://jira.atlassian.com/browse/SRCTREE-8076" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2023-22514", "datePublished": "2025-03-18T17:03:59.441Z", "dateReserved": "2023-01-01T00:01:22.330Z", "dateUpdated": "2025-05-12T15:40:34.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-13385 (GCVE-0-2018-13385)
Vulnerability from cvelistv5
Published
2018-07-24 13:00
Modified
2024-09-16 22:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for macOS |
Version: unspecified < 2.7.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:35.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5846" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for macOS", "vendor": "Atlassian", "versions": [ { "lessThan": "2.7.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-24T12:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREE-5846" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-07-18T00:00:00", "ID": "CVE-2018-13385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.7.6" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREE-5846", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREE-5846" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-13385", "datePublished": "2018-07-24T13:00:00Z", "dateReserved": "2018-07-06T00:00:00", "dateUpdated": "2024-09-16T22:08:24.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-22165 (GCVE-0-2025-22165)
Vulnerability from cvelistv5
Published
2025-07-24 22:30
Modified
2025-07-29 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Security Misconfiguration
Summary
This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac.
This ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.
Atlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives .
You can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives .
This vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE).
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Mac |
Version: All versions from 4.2.8 to 4.2.11 inclusive |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-22165", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-28T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-29T03:55:16.721Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Sourcetree for Mac", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "All versions from 4.2.8 to 4.2.11 inclusive" }, { "status": "unaffected", "version": "All versions from 4.2.12" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", "versionEndExcluding": "4.2.12", "versionStartIncluding": "4.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:sourcetree:4.2.12:*:*:*:*:macos:*:*", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "credits": [ { "lang": "en", "value": "Karol Mazurek (AFINE)" } ], "descriptions": [ { "lang": "en", "value": "This Medium severity ACE (Arbitrary Code Execution) vulnerability was introduced in version 4.2.8 of Sourcetree for Mac.\n\nThis ACE (Arbitrary Code Execution) vulnerability, with a CVSS Score of 5.9, allows a locally authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\u00a0\n\nAtlassian recommends that Sourcetree for Mac users upgrade to the latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://www.sourcetreeapp.com/download-archives .\n\nYou can download the latest version of Sourcetree for Mac from the download center https://www.sourcetreeapp.com/download-archives .\n\nThis vulnerability was found through the Atlassian Bug Bounty Program by Karol Mazurek (AFINE)." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:H/SI:H/SA:L", "version": "4.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Security Misconfiguration", "lang": "en", "type": "Security Misconfiguration" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-24T22:30:00.776Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://jira.atlassian.com/browse/SRCTREE-8217" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2025-22165", "datePublished": "2025-07-24T22:30:00.776Z", "dateReserved": "2025-01-01T00:01:27.176Z", "dateUpdated": "2025-07-29T03:55:16.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20234 (GCVE-0-2018-20234)
Vulnerability from cvelistv5
Published
2019-03-08 18:00
Modified
2024-09-16 23:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for macOS |
Version: 1.2 < unspecified Version: unspecified < 3.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREE-6391" }, { "name": "107414", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107414" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for macOS", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "1.2", "versionType": "custom" }, { "lessThan": "3.1.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-21T15:06:05", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREE-6391" }, { "name": "107414", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107414" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-06T00:00:00", "ID": "CVE-2018-20234", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for macOS", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "1.2" }, { "version_affected": "\u003c", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREE-6391", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREE-6391" }, { "name": "107414", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107414" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20234", "datePublished": "2019-03-08T18:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T23:30:34.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20235 (GCVE-0-2018-20235)
Vulnerability from cvelistv5
Published
2019-03-08 18:00
Modified
2024-09-16 23:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Argument Injection
Summary
There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Atlassian | Sourcetree for Windows |
Version: 0.5a < unspecified Version: unspecified < 3.0.15 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T11:58:18.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11289" }, { "name": "107407", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107407" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Sourcetree for Windows", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "0.5a", "versionType": "custom" }, { "lessThan": "3.0.15", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-03-06T00:00:00", "descriptions": [ { "lang": "en", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-21T15:06:05", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11289" }, { "name": "107407", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107407" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-03-06T00:00:00", "ID": "CVE-2018-20235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Sourcetree for Windows", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "0.5a" }, { "version_affected": "\u003c", "version_value": "3.0.15" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There was an argument injection vulnerability in Atlassian Sourcetree for Windows from version 0.5a before version 3.0.15 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/SRCTREEWIN-11289", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/SRCTREEWIN-11289" }, { "name": "107407", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107407" }, { "name": "20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Mar/30" }, { "name": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-20235", "datePublished": "2019-03-08T18:00:00Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T23:56:51.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }