Uploaded image for project: 'Bamboo Data Center'
  1. Bamboo Data Center
  2. BAM-10030

OS command injection vulnerability in Perforce library

    • Icon: Bug Bug
    • Resolution: Fixed
    • Icon: Medium Medium
    • 3.1.1, 3.2
    • 2.4, 2.5, 2.6, 2.7, 3.0, 3.1
    • Security
    • None

      We have identified and fixed an OS command injection vulnerability in the third-party Perforce library used by Bamboo.

      • An attacker can take advantage of the vulnerability to execute arbitrary commands on a Bamboo server.

      This issue is reported in our security advisory on this page:
      http://confluence.atlassian.com/x/lwH6Dw

      Patch is available, see the attached file.

            [BAM-10030] OS command injection vulnerability in Perforce library

            Monique Khairuliana (Inactive) made changes -
            Workflow Original: Bamboo Workflow 2016 v1 - Restricted [ 1435853 ] New: JAC Bug Workflow v3 [ 3379850 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            Owen made changes -
            Workflow Original: Bamboo Workflow 2016 v1 [ 1408331 ] New: Bamboo Workflow 2016 v1 - Restricted [ 1435853 ]
            Marek Went (Inactive) made changes -
            Workflow Original: Bamboo Workflow 2014 v2 [ 608717 ] New: Bamboo Workflow 2016 v1 [ 1408331 ]
            James Dumay made changes -
            Workflow Original: Bamboo Workflow 2014 [ 598210 ] New: Bamboo Workflow 2014 v2 [ 608717 ]
            James Dumay made changes -
            Workflow Original: Bamboo Workflow 2010 [ 351516 ] New: Bamboo Workflow 2014 [ 598210 ]
            paulwatson (Inactive) made changes -
            Security Original: Reporters and Developers [ 10070 ]

            VitalyA added a comment -

            A patch is available for Bamboo 2.4 – 3.1.

            Applying the patch

            • Download the p4java-0.7.5-atlassian-6.jar file that is attached to this issue.
            • Stop Bamboo.
            • Make a backup of the <bamboo_install_dir> directory.
            • Copy the downloaded jar file into <bamboo_install_dir>/Bamboo/webapp/WEB-INF/lib, and delete the existing p4java jar file.
            • Restart Bamboo.

            VitalyA added a comment - A patch is available for Bamboo 2.4 – 3.1. Applying the patch Download the p4java-0.7.5-atlassian-6.jar file that is attached to this issue. Stop Bamboo. Make a backup of the <bamboo_install_dir> directory. Copy the downloaded jar file into <bamboo_install_dir>/Bamboo/webapp/WEB-INF/lib, and delete the existing p4java jar file. Restart Bamboo.
            VitalyA made changes -
            Description Original: We have identified and fixed an OS command injection vulnerability in the Perforce library used by Bamboo.

            * An attacker might take advantage of the vulnerability to execute arbitrary commands on a Bamboo server.

            This issue is reported in our security advisory on this page:
            http://confluence.atlassian.com/x/lwH6Dw

            You can read more about shell injection attacks at cgisecurity, CERT and other places on the web:

            * http://www.cgisecurity.com/xss-faq.html
            * http://www.cert.org/advisories/CA-2000-02.html

            New: We have identified and fixed an OS command injection vulnerability in the third-party Perforce library used by Bamboo.

            * An attacker can take advantage of the vulnerability to execute arbitrary commands on a Bamboo server.

            This issue is reported in our security advisory on this page:
            http://confluence.atlassian.com/x/lwH6Dw

            Patch is available, see the attached file.

            VitalyA made changes -
            Description Original: We have identified and fixed a shell injection vulnerability in the Perforce library used by Bamboo.

            * An attacker might take advantage of the vulnerability to execute arbitrary commands on a Bamboo server.

            This issue is reported in our security advisory on this page:
            http://confluence.atlassian.com/x/lwH6Dw

            You can read more about shell injection attacks at cgisecurity, CERT and other places on the web:

            * http://www.cgisecurity.com/xss-faq.html
            * http://www.cert.org/advisories/CA-2000-02.html

            New: We have identified and fixed an OS command injection vulnerability in the Perforce library used by Bamboo.

            * An attacker might take advantage of the vulnerability to execute arbitrary commands on a Bamboo server.

            This issue is reported in our security advisory on this page:
            http://confluence.atlassian.com/x/lwH6Dw

            You can read more about shell injection attacks at cgisecurity, CERT and other places on the web:

            * http://www.cgisecurity.com/xss-faq.html
            * http://www.cert.org/advisories/CA-2000-02.html

            Summary Original: Shell injection vulnerability in Perforce library New: OS command injection vulnerability in Perforce library
            paulwatson (Inactive) made changes -
            Attachment Original: undefined [ 53971 ]

              vosipov VitalyA
              pwatson paulwatson (Inactive)
              Affected customers:
              0 This affects my team
              Watchers:
              0 Start watching this issue

                Created:
                Updated:
                Resolved: