Vulnerability Description
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Crucible | < 4.3.2 |
| Atlassian | Fisheye | < 4.3.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104578Third Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/CRUC-8212Issue TrackingThird Party Advisory
- https://jira.atlassian.com/browse/FE-7061Issue TrackingThird Party Advisory
- http://www.securityfocus.com/bid/104578Third Party AdvisoryVDB Entry
- https://jira.atlassian.com/browse/CRUC-8212Issue TrackingThird Party Advisory
- https://jira.atlassian.com/browse/FE-7061Issue TrackingThird Party Advisory
FAQ
What is CVE-2017-16859?
CVE-2017-16859 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within c...
How severe is CVE-2017-16859?
CVE-2017-16859 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-16859?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Crucible, Atlassian Fisheye.