-
Bug
-
Resolution: Fixed
-
Highest
-
None
-
Severity 1 - Critical
-
Fisheye and Crucible did not check that the name of a file in a Mercurial repository contained argument parameters. An attacker who has permission to add a repository or commit to a mercurial repository tracked by Fisheye or Crucible, can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible.
All versions of Fisheye and Crucible before 4.4.3 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.1 (the fixed version for 4.5.x) are affected by this vulnerability.
Affected versions:
- All versions of Fisheye and Crucible before 4.4.3 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.1 (the fixed version for 4.5.x) are affected by this vulnerability.
Fix:
- Fisheye version 4.5.1 is available to download from https://www.atlassian.com/software/fisheye/download.
- Crucible version 4.5.1 is available to download from https://www.atlassian.com/software/crucible/download.
- Fisheye version 4.4.3 is available to download from https://www.atlassian.com/software/fisheye/download-archives.
- Crucible version 4.4.3 is available to download from https://www.atlassian.com/software/fisheye/download-archives.
Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.
For additional details see the full advisory.
- was cloned as
-
FE-6955 Argument injection in Mercurial repository handling - CVE-2017-14591
-
- Closed
-
- mentioned in
-
Page Failed to load
- relates to
-
SECENG-895 Failed to load
Form Name |
---|
CVSS v3 score: 9.0 => Critical severity
Exploitability Metrics
Scope Metric
Impact Metrics
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H