-
Bug
-
Resolution: Fixed
-
Highest
-
None
-
None
-
None
-
Severity 1 - Critical
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
Affected versions:
- Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability
Fix:
- Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .
Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.
For additional details see the full advisory.
- is related to
-
SRCTREE-5246 Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
-
- Closed
-
-
SRCTREEWIN-8257 Mercurial: arbitrary command execution in mercurial repositories with a git submodule - CVE-2017-17458
-
- Closed
-
-
SRCTREEWIN-8261 Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831
-
- Closed
-
- relates to
-
SRCTREE-5243 Various argument and command injection issues in Sourcetree for macOS - CVE-2017-14592
-
- Closed
-
-
SECENG-971 Failed to load
[SRCTREEWIN-8256] Various argument and command injection issues - CVE-2017-14593
Labels | Original: CVE-2017-14593 advisory cvss-critical security | New: CVE-2017-14593 advisory advisory-released cvss-critical security |
Workflow | Original: JAC Bug Workflow v3 [ 3453549 ] | New: SRCTREE JAC Bug Workflow [ 3744147 ] |
Workflow | Original: SourceTree Bug Workflow [ 2494864 ] | New: JAC Bug Workflow v3 [ 3453549 ] |
Description |
Original:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
New:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from [https://www.sourcetreeapp.com/] . *Acknowledgements* Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Security | Original: Reporter and Atlassian Staff [ 10751 ] |
Description |
Original:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
New:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Description |
Original:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the full advisory. |
New:
Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.
*Affected versions:* * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability. *Fix:* * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ . *Acknowledgements* Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us. For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO]. |
Link |
New:
This issue is related to |
Link |
New:
This issue is related to |
Link |
New:
This issue is related to |