Uploaded image for project: 'Sourcetree For Mac'
  1. Sourcetree For Mac
  2. SRCTREE-5243

Various argument and command injection issues in Sourcetree for macOS - CVE-2017-14592

    • Severity 1 - Critical

      Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

      Affected versions:

      • Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.

      Fix:

      Acknowledgements
      Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

      For additional details see the full advisory.

            [SRCTREE-5243] Various argument and command injection issues in Sourcetree for macOS - CVE-2017-14592

            David Black made changes -
            Labels Original: CVE-2017-14592 advisory cvss-critical security New: CVE-2017-14592 advisory advisory-released cvss-critical security
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JAC Bug Workflow v3 [ 3371264 ] New: SRCTREE JAC Bug Workflow [ 3737627 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: SourceTree Bug Workflow [ 2494863 ] New: JAC Bug Workflow v3 [ 3371264 ]
            David Black made changes -
            Description Original: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
            * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            New: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
             * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.

            *Fix:*
             * Upgrade Sourcetree for macOS to version 2.7.0 or higher from [https://www.sourcetreeapp.com/] .

            *Acknowledgements*
             Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            Security Metrics Bot made changes -
            Security Original: Reporter and Atlassian Staff [ 10751 ]
            David Black made changes -
            Description Original: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
            * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability


            *Fix:*
            * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            New: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
            * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Description Original: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
            * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability


            *Fix:*
            * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the full advisory.
            New: Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for macOS. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
            * Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability


            *Fix:*
            * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Link New: This issue is related to SRCTREE-5247 [ SRCTREE-5247 ]
            David Black made changes -
            Link New: This issue is related to SRCTREE-5246 [ SRCTREE-5246 ]
            David Black made changes -
            Remote Link New: This issue links to "SECENG-971 (Security JIRA (CYBER/J))" [ 340942 ]

              Unassigned Unassigned
              dblack David Black
              Affected customers:
              0 This affects my team
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: