-
Bug
-
Resolution: Fixed
-
Highest
-
2.1
-
None
-
Severity 1 - Critical
The embedded version of Git LFS used in Sourcetree for macOS was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for macOS by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems running a vulnerable version of Sourcetree for macOS. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.
Affected versions:
- Versions of Sourcetree for macOS starting with 2.1 before version 2.7.0 are affected by this vulnerability
Fix:
- Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ .
For additional details see the full advisory.
- is related to
-
SRCTREEWIN-8261 Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
-
- Closed
-
- relates to
-
SRCTREE-5243 Various argument and command injection issues in Sourcetree for macOS - CVE-2017-14592
-
- Closed
-
-
SRCTREE-5244 Mercurial: arbitrary command execution in mercurial repositories with a git submodule - CVE-2017-17458
-
- Closed
-
-
SRCTREEWIN-8256 Various argument and command injection issues - CVE-2017-14593
-
- Closed
-
-
SRCTREEWIN-8257 Mercurial: arbitrary command execution in mercurial repositories with a git submodule - CVE-2017-17458
-
- Closed
-
-
SECENG-971 Loading...
[SRCTREE-5246] Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
Labels | Original: CVE-2017-17831 advisory cvss-critical security | New: CVE-2017-17831 advisory advisory-released cvss-critical security |
Workflow | Original: JAC Bug Workflow v3 [ 3372205 ] | New: SRCTREE JAC Bug Workflow [ 3737774 ] |
Workflow | Original: SourceTree Bug Workflow [ 2494868 ] | New: JAC Bug Workflow v3 [ 3372205 ] |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for macOS was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for macOS by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for macOS. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 2.1 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
New:
The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for macOS was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for macOS by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems running a vulnerable version of Sourcetree for macOS. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 2.1 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Remote Link | New: This issue links to "SECENG-971 (Security JIRA (CYBER/J))" [ 342142 ] |
Description |
Original:
The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for macOS was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for macOS by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for macOS. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 2.1 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . For additional details see the full advisory. |
New:
The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for macOS was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for macOS by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for macOS. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for macOS starting with 2.1 before version 2.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for macOS to version 2.7.0 or higher from https://www.sourcetreeapp.com/ . For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Link |
New:
This issue is related to |
Link |
Original:
This issue was cloned as |
Labels | Original: advisory cvss-critical security | New: CVE-2017-17831 advisory cvss-critical security |