-
Bug
-
Resolution: Fixed
-
Medium
-
3.2.0, 4.2.1, 4.4.1
-
None
-
Severity 3 - Minor
-
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter.
- is cloned from
-
CRUC-8212 Path traversal Vulnerability in the review attachment resource - CVE-2017-16859
-
- Closed
-
[FE-7061] Path traversal Vulnerability in the review attachment resource - CVE-2017-16859
Labels | Original: CVE-2017-16859 advisory advisory-released cvss-high path-traversal security | New: CVE-2017-16859 advisory advisory-released cvss-high idor path-traversal security |
Workflow | Original: FE-CRUC Bug Workflow [ 2942976 ] | New: JAC Bug Workflow v3 [ 2957994 ] |
Workflow | Original: FECRU Development Workflow - Triage - Restricted [ 2706144 ] | New: FE-CRUC Bug Workflow [ 2942976 ] |
Labels | Original: CVE-2017-16859 advisory advisory-to-release cvss-high path-traversal security | New: CVE-2017-16859 advisory advisory-released cvss-high path-traversal security |
Labels | Original: advisory advisory-to-release cvss-high path-traversal security | New: CVE-2017-16859 advisory advisory-to-release cvss-high path-traversal security |
Resolution | New: Fixed [ 1 ] | |
Status | Original: Needs Triage [ 10030 ] | New: Closed [ 6 ] |
Fix Version/s | New: 4.5.0 [ 71891 ] | |
Fix Version/s | New: 4.4.3 [ 73503 ] | |
Fix Version/s | New: 4.3.2 [ 67297 ] | |
Fix Version/s | Original: 4.3.2 [ 67298 ] | |
Fix Version/s | Original: 4.5.0 [ 72296 ] | |
Fix Version/s | Original: 4.4.3 [ 73502 ] | |
Key |
Original:
|
New:
|
Affects Version/s | New: 4.4.1 [ 70801 ] | |
Affects Version/s | New: 4.2.1 [ 64120 ] | |
Affects Version/s | New: 3.2.0 [ 34893 ] | |
Affects Version/s | Original: 3.2.0 [ 35490 ] | |
Affects Version/s | Original: 4.2.1 [ 64617 ] | |
Affects Version/s | Original: 4.4.1 [ 70800 ] | |
Project | Original: Crucible [ 11771 ] | New: FishEye [ 11830 ] |
Link | New: This issue is detailed by FECRU-7456 [ FECRU-7456 ] |
This is an independent assessment and you should evaluate its applicability to your own IT environment.
CVSS v3 score: 7.7 => High severity
Exploitability Metrics
Scope Metric
Impact Metrics
See http://go.atlassian.com/cvss for more details.
https://asecurityteam.bitbucket.io/cvss_v3/#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N