Uploaded image for project: 'Sourcetree for Windows'
  1. Sourcetree for Windows
  2. SRCTREEWIN-9077

Remote Code Execution in Sourcetree for Windows, via Mercurial repo with Git subrepo - CVE-2018-13397

    • Severity 1 - Critical

      There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.

       

      For additional details, see the full advisory

            [SRCTREEWIN-9077] Remote Code Execution in Sourcetree for Windows, via Mercurial repo with Git subrepo - CVE-2018-13397

            Monique Khairuliana (Inactive) made changes -
            Workflow Original: JAC Bug Workflow v3 [ 3454480 ] New: SRCTREE JAC Bug Workflow [ 3743717 ]
            Monique Khairuliana (Inactive) made changes -
            Workflow Original: SourceTree Bug Workflow [ 2771142 ] New: JAC Bug Workflow v3 [ 3454480 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            David Black made changes -
            Labels Original: CVE-2018-13397 advisory advisory-to-release bugbounty cvss-critical rce security New: CVE-2018-13397 advisory advisory-released bugbounty cvss-critical rce security
            David Black made changes -
            Description Original: There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 , via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.


             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            New: There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.


             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            David Black made changes -
            Description Original: There was an argument injection vulnerability in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 , via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.


             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            New: There was an argument injection vulnerability in Sourcetree for Windows from version 0.5.1.0 before version 3.0.0 , via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.


             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            David Black made changes -
            Description Original: Component in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.

             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            New: There was an argument injection vulnerability in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 , via Git subrepositories in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system.


             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            Security Metrics Bot made changes -
            Security Original: Atlassian Staff [ 10750 ]
            David Black made changes -
            Due Date Original: 25/Sep/2018 New: 24/Oct/2018
            David Black made changes -
            Description Original: Component in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.

             

            For additional details, see the full advisory: [https://confluence.atlassian.com/x/v00SOQ]
            New: Component in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.

             

            For additional details, see the [full advisory|https://confluence.atlassian.com/x/v00SOQ]
            David Black made changes -
            Description Original: Component in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.

             

            For additional details, see the full advisory: [https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2018-10-03]
            New: Component in Atlassian SourceTree for Windows from version 0.5.1.0 before version 3.0.0 allows remote attackers to execute code of their choice via a remote code execution vulnerability.

             

            For additional details, see the full advisory: [https://confluence.atlassian.com/x/v00SOQ]

              Unassigned Unassigned
              security-metrics-bot Security Metrics Bot
              Affected customers:
              0 This affects my team
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: