Uploaded image for project: 'Sourcetree for Windows'
  1. Sourcetree for Windows
  2. SRCTREEWIN-8256

Various argument and command injection issues - CVE-2017-14593

    • Severity 1 - Critical

      Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

      Affected versions:

      • Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability

      Fix:

      Acknowledgements
      Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

      For additional details see the full advisory.

            [SRCTREEWIN-8256] Various argument and command injection issues - CVE-2017-14593

            David Black made changes -
            Labels Original: CVE-2017-14593 advisory cvss-critical security New: CVE-2017-14593 advisory advisory-released cvss-critical security
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JAC Bug Workflow v3 [ 3453549 ] New: SRCTREE JAC Bug Workflow [ 3744147 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: SourceTree Bug Workflow [ 2494864 ] New: JAC Bug Workflow v3 [ 3453549 ]
            David Black made changes -
            Description Original: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            New: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.

            *Affected versions:*
             * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability

            *Fix:*
             * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from [https://www.sourcetreeapp.com/] .

            *Acknowledgements*
             Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            Security Metrics Bot made changes -
            Security Original: Reporter and Atlassian Staff [ 10751 ]
            David Black made changes -
            Description Original: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            New: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Description Original: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the full advisory.
            New: Sourcetree for Windows had several argument and command injection bugs in Mercurial and Git repository handling. An attacker who has permission to commit to a repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system running vulnerable versions of Sourcetree for Windows. From version 0.8.4b of Sourcetree for Windows, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 0.5.1.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .


            *Acknowledgements*
            Atlassian would like to credit ZhangTianqi @ Tophant for reporting this issue to us.

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Link New: This issue is related to SRCTREE-5247 [ SRCTREE-5247 ]
            David Black made changes -
            Link New: This issue is related to SRCTREE-5246 [ SRCTREE-5246 ]
            David Black made changes -
            Link New: This issue is related to SRCTREEWIN-8257 [ SRCTREEWIN-8257 ]

              Unassigned Unassigned
              dblack David Black
              Affected customers:
              0 This affects my team
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: