Lucene search

K
atlassianDblackBAM-18843
HistoryNov 15, 2017 - 10:54 p.m.

Argument injection in Mercurial repository handling - CVE-2017-14590

2017-11-1522:54:41
dblack
jira.atlassian.com
9

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS

0.01

Percentile

84.0%

Bamboo did not check that the name of a branch in a Mercurial repository contained argument parameters. An attacker who has permission to do one or more of the following:

  • create a repository in Bamboo
  • edit an existing plan in Bamboo that has a non-linked Mercurial repository
  • create or edit a plan in Bamboo when there is at least one linked Mercurial repository that the attacker has permission to use
  • commit to a Mercurial repository used by a Bamboo plan which has branch detection enabled
    can execute code of their choice on systems that run a vulnerable version of Bamboo Server.

Affected versions:

  • Versions of Bamboo starting with 2.7.0 before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.

Fix:

Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

For additional details see the [full advisory|https://confluence.atlassian.com/x/6FcGO].

Affected configurations

Vulners
Node
atlassianbamboo_data_centerRange2.7
OR
atlassianbamboo_data_centerRange<6.2.5
OR
atlassianbamboo_data_centerRange<6.1.6
VendorProductVersionCPE
atlassianbamboo_data_center*cpe:2.3:a:atlassian:bamboo_data_center:*:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS

0.01

Percentile

84.0%