Uploaded image for project: 'Sourcetree for Windows'
  1. Sourcetree for Windows
  2. SRCTREEWIN-8261

Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831

    • Severity 1 - Critical

      The embedded version of Git LFS used in Sourcetree for Windows was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for Windows by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems running a vulnerable version of Sourcetree for Windows. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.

      Affected versions:

      • Versions of Sourcetree for Windows starting with 1.7.0 before version 2.4.7.0 are affected by this vulnerability.

      Fix:

      For additional details see the full advisory.

            [SRCTREEWIN-8261] Git LFS: Arbitrary command execution in repositories with Git LFS enabled - CVE-2017-17831

            David Black made changes -
            Labels Original: CVE-2017-17831 advisory cvss-critical security New: CVE-2017-17831 advisory advisory-released command-injection cvss-critical security
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JAC Bug Workflow v3 [ 3453757 ] New: SRCTREE JAC Bug Workflow [ 3744382 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: SourceTree Bug Workflow [ 2495485 ] New: JAC Bug Workflow v3 [ 3453757 ]
            Security Metrics Bot made changes -
            Security Original: Reporter and Atlassian Staff [ 10751 ]
            David Black made changes -
            Description Original: The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for Windows was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for Windows by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for Windows. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 1.7.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            New: The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for Windows was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for Windows by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems running a vulnerable version of Sourcetree for Windows. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 1.7.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Fix Version/s New: 2.4.7.0 [ 77427 ]
            David Black made changes -
            Remote Link New: This issue links to "SECENG-971 (Security JIRA (CYBER/J))" [ 342143 ]
            David Black made changes -
            Description Original: The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for Windows was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for Windows by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for Windows. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 1.7.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .

            For additional details see the full advisory.
            New: The embedded version of [Git LFS|https://git-lfs.github.com] used in Sourcetree for Windows was vulnerable to CVE-2017-17831. An attacker can exploit this issue if they can commit to a git repository linked in Sourcetree for Windows by adding a .lfsconfig file containing a malicious lfs url, allowing them to execute arbitrary code on systems a running a vulnerable version of Sourcetree for Windows. This vulnerability can also be triggered from a web page through the use of the Sourcetree URI handler.


            *Affected versions:*
            * Versions of Sourcetree for Windows starting with 1.7.0 before version 2.4.7.0 are affected by this vulnerability.


            *Fix:*
            * Upgrade Sourcetree for Windows to version 2.4.7.0 or higher from https://www.sourcetreeapp.com/ .

            For additional details see the [full advisory|https://confluence.atlassian.com/x/lIIyO].
            David Black made changes -
            Link New: This issue relates to SRCTREE-5246 [ SRCTREE-5246 ]
            David Black made changes -
            Link Original: This issue is cloned from SRCTREE-5246 [ SRCTREE-5246 ]

              Unassigned Unassigned
              dblack David Black
              Affected customers:
              0 This affects my team
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: