Lucene search

K
atlassianDblackBAM-19743
HistoryMar 08, 2018 - 4:18 a.m.

Argument injection through Mercurial repository uri handling on Windows - CVE-2018-5224

2018-03-0804:18:21
dblack
jira.atlassian.com
18

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

72.7%

Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to do one or more of the following:

  • create a repository in Bamboo
  • edit an existing plan in Bamboo that has a non-linked Mercurial repository
  • create a plan in Bamboo either globally or in a project using Bamboo Specs

can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system.

Affected versions:

  • All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability.

Fix:

Acknowledgements
Atlassian would like to credit Zhang Tianqi @ Tophant for reporting this issue to us.

For additional details see the [full advisory|https://confluence.atlassian.com/x/PS9sO].

Affected configurations

Vulners
Node
atlassianbamboo_data_centerRangeā‰¤2.7.1
OR
atlassianbamboo_data_centerRangeā‰¤6.3.0
OR
atlassianbamboo_data_centerRangeā‰¤6.4.0
OR
atlassianbamboo_data_centerRange<6.4.1
OR
atlassianbamboo_data_centerRange<6.3.3
VendorProductVersionCPE
atlassianbamboo_data_center*cpe:2.3:a:atlassian:bamboo_data_center:*:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

72.7%