-
Bug
-
Resolution: Fixed
-
Highest
-
2.7.1, 6.3.0, 6.4.0
-
Severity 1 - Critical
-
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
- create a repository in Bamboo
- edit an existing plan in Bamboo that has a non-linked Mercurial repository
- create a plan in Bamboo either globally or in a project using Bamboo Specs
can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system.
Affected versions:
- All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability.
Fix:
- Bamboo version 6.4.1 is available to download from https://www.atlassian.com/software/bamboo/download.
- Bamboo version 6.3.3 is available to download from https://www.atlassian.com/software/bamboo/download-archives.
Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.
For additional details see the full advisory.
- relates to
-
BDEV-14333 Failed to load
-
SECENG-1257 Failed to load
[BAM-19743] Argument injection through Mercurial repository uri handling on Windows - CVE-2018-5224
Labels | Original: CVE-2018-5224 advisory advisory-released argument-injection bugbounty rce security | New: CVE-2018-5224 advisory advisory-released argument-injection bugbounty injection rce security |
Workflow | Original: Bamboo Workflow 2016 v1 - Restricted [ 2642930 ] | New: JAC Bug Workflow v3 [ 3385582 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Symptom Severity | Original: Critical [ 14430 ] | New: Severity 1 - Critical [ 15830 ] |
Labels | Original: CVE-2018-5224 advisory advisory-to-release argument-injection bugbounty rce security | New: CVE-2018-5224 advisory advisory-released argument-injection bugbounty rce security |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
New:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* * All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
Description |
Original:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
New:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
Description |
Original:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
New:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
Description |
Original:
Bamboo did not correctly check that a configured Mercurial repository uri could not contain values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo running on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
New:
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
Description |
Original:
Bamboo did not correctly check that a configured Mercurial repository uri could not contain values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository can execute code of their choice on systems that run a vulnerable version of Bamboo running on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |
New:
Bamboo did not correctly check that a configured Mercurial repository uri could not contain values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:
* create a repository in Bamboo * edit an existing plan in Bamboo that has a non-linked Mercurial repository * create a plan in Bamboo either globally or in a project using Bamboo Specs can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. can execute code of their choice on systems that run a vulnerable version of Bamboo running on the Windows operating system. *Affected versions:* All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability. *Fix:* * Bamboo version 6.4.1 is available to download from [https://www.atlassian.com/software/bamboo/download]. * Bamboo version 6.3.3 is available to download from [https://www.atlassian.com/software/bamboo/download-archives]. *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO]. |