-
Bug
-
Resolution: Fixed
-
Highest
-
None
-
None
-
None
-
Severity 1 - Critical
There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 before version 3.0.0, via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
For additional details, see the full advisory
- relates to
-
SRCTREEWIN-9077 Remote Code Execution in Sourcetree for Windows, via Mercurial repo with Git subrepo - CVE-2018-13397
-
- Closed
-
[SRCTREE-5985] Remote Code Execution in Sourcetree for macOS, via Mercurial repo with Git subrepo - CVE-2018-13396
Workflow | Original: JAC Bug Workflow v3 [ 3372838 ] | New: SRCTREE JAC Bug Workflow [ 3737785 ] |
Workflow | Original: SourceTree Bug Workflow [ 2816492 ] | New: JAC Bug Workflow v3 [ 3372838 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Description |
Original:
There was an argument injection vulnerability in Sourcetree for macOS before version 3.0.0, via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ] |
New:
There was an argument injection vulnerability in Sourcetree for macOS from version 1.0b2 before version 3.0.0 before version 3.0.0, via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ] |
Labels | Original: CVE-2018-13396 advisory advisory-to-release bugbounty cvss-critical rce security | New: CVE-2018-13396 advisory advisory-released bugbounty cvss-critical rce security |
Description |
Original:
Component in Atlassian SourceTree for macOS from version 1.02b before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.
For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ] |
New:
There was an argument injection vulnerability in Sourcetree for macOS before version 3.0.0, via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ] |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
Component in Atlassian SourceTree for macOS from version 1.02b before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.
For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2018-10-03] |
New:
Component in Atlassian SourceTree for macOS from version 1.02b before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.
For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ] |
Link |
New:
This issue relates to |
Summary | Original: Remote Code Execution in Sourcetree for macOS, via Mercurial repo with Git subrepo | New: Remote Code Execution in Sourcetree for macOS, via Mercurial repo with Git subrepo - CVE-2018-13396 |
Labels | Original: advisory advisory-to-release bugbounty cvss-critical rce security | New: CVE-2018-13396 advisory advisory-to-release bugbounty cvss-critical rce security |