Vulnerability Description
It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Bamboo | < 6.1.6 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102188Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-9399Vendor Advisory
- https://jira.atlassian.com/browse/BAM-18842Issue TrackingVendor Advisory
- http://www.securityfocus.com/bid/102188Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-9399Vendor Advisory
- https://jira.atlassian.com/browse/BAM-18842Issue TrackingVendor Advisory
FAQ
What is CVE-2017-14589?
CVE-2017-14589 is a vulnerability with a CVSS score of 9.6 (CRITICAL). It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a...
How severe is CVE-2017-14589?
CVE-2017-14589 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14589?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Bamboo.