-
Bug
-
Resolution: Fixed
-
Highest
-
None
-
None
-
Severity 1 - Critical
-
Bamboo has a resource which accepts a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can login to Bamboo as a user is able to use this vulnerability to execute Java code of their choice on systems that have a vulnerable version of Bamboo.
Affected versions:
- Versions of Bamboo starting with 6.0.0 before 6.0.5 (the fixed version for 6.0.x ) and from before 6.1.4 (the fixed version for 6.1.x) are affected by this vulnerability.
Fix:
- Bamboo 6.2.1 is available to download from https://www.atlassian.com/software/bamboo/download.
- Bamboo 6.1.4 is available to download from https://www.atlassian.com/software/bamboo/download-archives.
- Bamboo 6.0.5 is available to download from https://www.atlassian.com/software/bamboo/download-archives.
For additional details see the full advisory.
[BAM-18735] Remote Code Execution - CVE-2017-9514
Remote Link | New: This issue links to "Page (Confluence)" [ 847667 ] |
Remote Link | New: This issue links to "Page (Confluence)" [ 846156 ] |
Labels | Original: advisory advisory-released cvss-critical security | New: advisory advisory-released cvss-critical injection rce security |
Workflow | Original: Bamboo Workflow 2016 v1 - Restricted [ 2446682 ] | New: JAC Bug Workflow v3 [ 3385569 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Symptom Severity | Original: Critical [ 14430 ] | New: Severity 1 - Critical [ 15830 ] |
Labels | Original: advisory advisory-released security | New: advisory advisory-released cvss-critical security |
Labels | Original: advisory no-cvss-required security | New: advisory advisory-released security |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
Bamboo has a resource which accepts a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can login to Bamboo as a user is able to use this vulnerability to execute Java code of their choice on systems that have a vulnerable version of Bamboo.
*Affected versions:* * Versions of Bamboo starting with 6.0.0 before 6.0.5 (the fixed version for 6.0.x ) and from before 6.1.4 (the fixed version for 6.1.x) are affected by this vulnerability. *Fix:* * *Bamboo* 6.2.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * *Bamboo* 6.1.4 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. * *Bamboo* 6.0.5 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. For additional details see the [full advisory|]. |
New:
Bamboo has a resource which accepts a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can login to Bamboo as a user is able to use this vulnerability to execute Java code of their choice on systems that have a vulnerable version of Bamboo.
*Affected versions:* * Versions of Bamboo starting with 6.0.0 before 6.0.5 (the fixed version for 6.0.x ) and from before 6.1.4 (the fixed version for 6.1.x) are affected by this vulnerability. *Fix:* * *Bamboo* 6.2.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * *Bamboo* 6.1.4 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. * *Bamboo* 6.0.5 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. For additional details see the [full advisory|https://confluence.atlassian.com/x/EZ-1Nw]. |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Resolved [ 5 ] |