-
Bug
-
Resolution: Fixed
-
Highest
-
None
-
None
-
Severity 2 - Major
-
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo.
Affected versions:
- All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.
Fix:
- Bamboo version 6.2.5 is available to download from https://www.atlassian.com/software/bamboo/download.
- Bamboo version 6.1.6 is available to download from https://www.atlassian.com/software/bamboo/download-archives.
Acknowledgements
Atlassian would like to credit Sebastian Perez for reporting this issue to us.
For additional details see the full advisory.
- is related to
-
BAM-18843 Argument injection in Mercurial repository handling - CVE-2017-14590
-
- Closed
-
- mentioned in
-
Page Failed to load
- relates to
-
BDEV-14068 Failed to load
-
SECENG-886 Failed to load
[BAM-18842] Remote code execution through OGNL double evaluation - CVE-2017-14589
Labels | Original: CVE-2017-14589 advisory advisory-released cvss-critical security | New: CVE-2017-14589 advisory advisory-released cvss-critical injection rce security |
Workflow | Original: Bamboo Workflow 2016 v1 - Restricted [ 2478569 ] | New: JAC Bug Workflow v3 [ 3385646 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Symptom Severity | Original: Major [ 14431 ] | New: Severity 2 - Major [ 15831 ] |
Labels | Original: CVE-2017-14589 advisory cvss-critical security | New: CVE-2017-14589 advisory advisory-released cvss-critical security |
Remote Link | New: This issue links to "Page (Extranet)" [ 340340 ] |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo.
*Affected versions:* * All versions of Bamboo before 6.1.5 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.4 (the fixed version for 6.2.x) are affected by this vulnerability. *Fix:* * Bamboo version 6.2.4 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.1.5 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Sebastian Perez for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/6FcGO]. |
New:
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo.
*Affected versions:* * All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability. *Fix:* * Bamboo version 6.2.5 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.1.6 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Sebastian Perez for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/6FcGO]. |
Fix Version/s | New: 6.1.6 [ 77296 ] | |
Fix Version/s | Original: 6.1.2 [ 73637 ] |
Remote Link | Original: This issue links to "Page (Extranet)" [ 333146 ] |
Description |
Original:
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo.
*Affected versions:* * All versions of Bamboo before 6.1.5 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.4 (the fixed version for 6.2.x) are affected by this vulnerability. *Fix:* * Bamboo version 6.2.4 is available for download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.1.5 is available for download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Sebastian Perez for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/6FcGO]. |
New:
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo.
*Affected versions:* * All versions of Bamboo before 6.1.5 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.4 (the fixed version for 6.2.x) are affected by this vulnerability. *Fix:* * Bamboo version 6.2.4 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.1.5 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Sebastian Perez for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/6FcGO]. |