Uploaded image for project: 'Sourcetree for Windows'
  1. Sourcetree for Windows
  2. SRCTREEWIN-11917

Remote code execution vulnerability for Sourcetree for Windows - CVE-2019-11582

    • Severity 1 - Critical

      There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

      Versions of Sourcetree for Windows starting with 0.5a before 3.1.3 are affected by this vulnerability.

      For additional details, see the full advisory: https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05

       

            [SRCTREEWIN-11917] Remote code execution vulnerability for Sourcetree for Windows - CVE-2019-11582

            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JAC Bug Workflow v3 [ 3456268 ] New: SRCTREE JAC Bug Workflow [ 3742842 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: SourceTree Bug Workflow [ 3208555 ] New: JAC Bug Workflow v3 [ 3456268 ]
            David Black made changes -
            Description Original: There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue. Versions of Sourcetree for Windows starting with 0.5a before 3.1.3 are affected by this vulnerability.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            New: There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

            Versions of Sourcetree for Windows starting with 0.5a before 3.1.3 are affected by this vulnerability.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            David Black made changes -
            Description Original: There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            New: There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue. Versions of Sourcetree for Windows starting with 0.5a before 3.1.3 are affected by this vulnerability.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            David Black made changes -
            Description Original: There was an argument injection vulnerability in SourceTree for Windows via the URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            New: There was an argument injection vulnerability in SourceTree for Windows in URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            David Black made changes -
            Description Original: There was a remote code execution vulnerability in SourceTree for Windows via the URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, the attacker gained remote code execution on the target system.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            New: There was an argument injection vulnerability in SourceTree for Windows via the URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, an attacker could gained remote code execution on the target system by exploiting this issue.

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2019-06-05]

             
            David Black made changes -
            Remote Link New: This issue links to "SRCTREE-6943 (Software Teams JIRA)" [ 430464 ]
            David Black made changes -
            Summary Original: Remote code execution vulnerability for Sourcetree for Windows -= New: Remote code execution vulnerability for Sourcetree for Windows - CVE-2019-11582
            David Black made changes -
            Summary Original: Remote code execution vulnerability for Sourcetree for Windows New: Remote code execution vulnerability for Sourcetree for Windows -=
            David Black made changes -
            Labels Original: advisory advisory-released cvss-critical security New: CVE-2019-11582 advisory advisory-released cvss-critical security

              Unassigned Unassigned
              enagy@atlassian.com logcabin (Inactive)
              Affected customers:
              0 This affects my team
              Watchers:
              3 Start watching this issue

                Created:
                Updated:
                Resolved: