We couldn't load all Actvitity tabs. Refresh the page to try again.
If the problem persists, contact your Jira admin.
IMPORTANT: JAC is a Public system and anyone on the internet will be able to view the data in the created JAC tickets. Please don’t include Customer or Sensitive data in the JAC ticket.
Uploaded image for project: 'Bamboo Data Center'
  1. Bamboo Data Center
  2. BAM-16439

CVE-2015-6576: Deserialisation Resulting in Remote Code Execution Vulnerability

      Bamboo had a resource that deserialised arbitrary user input without restriction. Attackers can use this vulnerability to execute Java code of their choice on systems that have a vulnerable version of Bamboo. To exploit this issue, attackers need to be able to access the Bamboo web interface.

      Affected versions:

      • All versions of Bamboo from 2.2 before 5.8.5 (the fixed version for 5.8.x) and from 5.9.0 before 5.9.7 (the fixed version for 5.9.x) are affected by this vulnerability.

      Fix:


      Acknowledgements:
      We would like to credit Matthias Kaiser of Code White for reporting this issue to us.


      For additional details see the full advisory.

            Loading...
            IMPORTANT: JAC is a Public system and anyone on the internet will be able to view the data in the created JAC tickets. Please don’t include Customer or Sensitive data in the JAC ticket.
            Uploaded image for project: 'Bamboo Data Center'
            1. Bamboo Data Center
            2. BAM-16439

            CVE-2015-6576: Deserialisation Resulting in Remote Code Execution Vulnerability

                Bamboo had a resource that deserialised arbitrary user input without restriction. Attackers can use this vulnerability to execute Java code of their choice on systems that have a vulnerable version of Bamboo. To exploit this issue, attackers need to be able to access the Bamboo web interface.

                Affected versions:

                • All versions of Bamboo from 2.2 before 5.8.5 (the fixed version for 5.8.x) and from 5.9.0 before 5.9.7 (the fixed version for 5.9.x) are affected by this vulnerability.

                Fix:


                Acknowledgements:
                We would like to credit Matthias Kaiser of Code White for reporting this issue to us.


                For additional details see the full advisory.

                        Unassigned Unassigned
                        837ea15a6f79 Matthias Kaiser
                        Votes:
                        0 Vote for this issue
                        Watchers:
                        6 Start watching this issue

                          Created:
                          Updated:
                          Resolved:

                            Unassigned Unassigned
                            837ea15a6f79 Matthias Kaiser
                            Affected customers:
                            0 This affects my team
                            Watchers:
                            6 Start watching this issue

                              Created:
                              Updated:
                              Resolved: