-
Bug
-
Resolution: Done
-
Highest
-
None
-
None
-
Severity 1 - Critical
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
Affected versions:
- Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.
Fix:
- Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .
Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.
For additional details see the full advisory.
- is related to
-
SRCTREE-5246 Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
-
- Closed
-
-
SRCTREEWIN-8256 Various argument and command injection issues - CVE-2017-14593
-
- Closed
-
-
SRCTREEWIN-8261 Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
-
- Closed
-
- relates to
-
SECENG-971 Failed to load
[SRCTREE-5243] Various argument and command injection issues in Sourcetree for macOS - CVE-2017-14592
Labels | Original: CVE-2017-14592 advisory cvss-critical security | New: CVE-2017-14592 advisory advisory-released cvss-critical security |
Workflow | Original: JAC Bug Workflow v3 [ 3371264 ] | New: SRCTREE JAC Bug Workflow [ 3737627 ] |
Workflow | Original: SourceTree Bug Workflow [ 2494863 ] | New: JAC Bug Workflow v3 [ 3371264 ] |
Description |
Original:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
New:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from [https://www.sourcetreeapp.com/] . *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
New:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Description |
Original:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the full advisory. |
New:
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Link |
New:
This issue is related to |
Link |
New:
This issue is related to |
Remote Link | New: This issue links to "SECENG-971 (Security JIRA (CYBER/J))" [ 340942 ] |