Vulnerability Description
Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. From version 1.4.0 of Sourcetree for macOS, this vulnerability can be triggered from a webpage through the use of the Sourcetree URI handler. Versions of Sourcetree for macOS starting with 1.0b2 before version 2.7.0 are affected by this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Sourcetree | >= 1.0, < 2.7 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/102926Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-Third Party Advisory
- https://jira.atlassian.com/browse/SRCTREE-5243Third Party Advisory
- http://www.securityfocus.com/bid/102926Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-Third Party Advisory
- https://jira.atlassian.com/browse/SRCTREE-5243Third Party Advisory
FAQ
What is CVE-2017-14592?
CVE-2017-14592 is a vulnerability with a CVSS score of 8.8 (HIGH). Sourcetree for macOS had several argument and command injection bugs in Mercurial and Git repository handling. An attacker with permission to commit to a repository linked in Sourcetree for macOS is a...
How severe is CVE-2017-14592?
CVE-2017-14592 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14592?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Sourcetree.