Uploaded image for project: 'Bamboo Data Center'
  1. Bamboo Data Center
  2. BAM-25808

SSRF (Server-Side Request Forgery) org.springframework:spring-web Dependency in Bamboo Data Center and Server

    • Icon: Public Security Vulnerability Public Security Vulnerability
    • Resolution: Fixed
    • Icon: High High
    • 9.2.14, 9.6.3
    • 9.0.0, (40)
      9.0.1, 9.1.0, 9.0.2, 9.3.0, 9.1.1, 9.2.1, 9.1.2, 9.0.3, 9.2.3, 9.1.3, 9.0.4, 9.4.0, 9.3.1, 9.2.4, 9.3.2, 9.2.5, 9.3.3, 9.3.4, 9.5.0, 9.2.6, 9.2.7, 9.3.5, 9.4.1, 9.4.2, 9.2.8, 9.3.6, 9.2.9, 9.2.10, 9.4.3, 9.2.11, 9.5.1, 9.6.0, 9.5.2, 9.2.12, 9.4.4, 9.6.1, 9.2.13, 9.5.3, 9.5.4, 9.6.2
    • None
    • 8.1
    • High
    • CVE-2024-22262
    • Atlassian (Internal)
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
    • SSRF (Server-Side Request Forgery)
    • Bamboo Data Center, Bamboo Server

      This High severity org.springframework:spring-web Dependency vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.

      This org.springframework:spring-web Dependency vulnerability, with a CVSS Score of 8.1 and a CVSS Vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.

      Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:

       

      Affected versions Fixed versions
      9.6.0 to 9.6.2 LTS 9.6.3 LTS recommended 
      from 9.5.0 to 9.5.2 9.6.3 LTS recommended 
      from 9.4.0 to 9.4.3 9.6.3 LTS recommended 
      from 9.3.0 to 9.3.6 9.6.3 LTS recommended 
      from 9.2.0 to 9.2.13 LTS 9.6.3 LTS recommended or 9.2.14 LTS
      from 9.1.0 to 9.1.3 9.6.3 LTS recommended or 9.2.14 LTS
      from 9.0.0 to 9.0.4 9.6.3 LTS recommended or 9.2.14 LTS
      Any earlier versions  9.6.3 LTS recommended or 9.2.14 LTS

       

      See the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives).

      The National Vulnerability Database provides the following description for this vulnerability: Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

      This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

            [BAM-25808] SSRF (Server-Side Request Forgery) org.springframework:spring-web Dependency in Bamboo Data Center and Server

            prodsec-jac-bot made changes -
            Resolution New: Fixed [ 1 ]
            Security Original: Atlassian Staff [ 10750 ]
            Status Original: Draft [ 12872 ] New: Published [ 12873 ]
            Lee Berg made changes -
            Description Original: This High severity org.springframework:spring-web Dependency vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.

            This org.springframework:spring-web Dependency vulnerability, with a CVSS Score of 8.1 and a CVSS Vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.

            Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:

            * Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.14

            * Bamboo Data Center and Server 9.6: Upgrade to a release greater than or equal to 9.6.3



            See the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives).

            The National Vulnerability Database provides the following description for this vulnerability: Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.

            This is the same as CVE-2024-22259 https://spring.io/security/cve-2024-22259  and CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.



            New: This High severity org.springframework:spring-web Dependency vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.1, 9.3.0, 9.4.0, 9.5.0, and 9.6.0 of Bamboo Data Center and Server.

            This org.springframework:spring-web Dependency vulnerability, with a CVSS Score of 8.1 and a CVSS Vector of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires user interaction.

            Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:

             
            ||Affected versions||*Fixed versions*||
            |9.6.0 to 9.6.2 LTS|9.6.3 LTS recommended |
            |from 9.5.0 to 9.5.2|9.6.3 LTS recommended |
            |from 9.4.0 to 9.4.3|9.6.3 LTS recommended |
            |from 9.3.0 to 9.3.6|9.6.3 LTS recommended |
            |from 9.2.0 to 9.2.13 LTS|9.6.3 LTS recommended or 9.2.14 LTS|
            |from 9.1.0 to 9.1.3|9.6.3 LTS recommended or 9.2.14 LTS|
            |from 9.0.0 to 9.0.4|9.6.3 LTS recommended or 9.2.14 LTS|
            |Any earlier versions |9.6.3 LTS recommended or 9.2.14 LTS|

             

            See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).

            The National Vulnerability Database provides the following description for this vulnerability: Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect [https://cwe.mitre.org/data/definitions/601.html]  attack or to a SSRF attack if the URL is used after passing validation checks.

            This is the same as CVE-2024-22259 [https://spring.io/security/cve-2024-22259]  and CVE-2024-22243 [https://spring.io/security/cve-2024-22243] , but with different input.
            Security Metrics Bot made changes -
            Labels Original: security New: advisory advisory-to-release dont-import security
            Security Metrics Bot created issue -

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

                Created:
                Updated:
                Resolved: