Vulnerability Description
Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary code by importing a file.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Hipchat Server | <= 2.2.2 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/archive/1/540410/100/0/threaded
- http://www.securityfocus.com/bid/97621Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/hc/hipchat-server-security-advisory-2017-04-12-Vendor Advisory
- https://jira.atlassian.com/browse/HCPUB-2903Issue TrackingPatch
- http://www.securityfocus.com/archive/1/540410/100/0/threaded
- http://www.securityfocus.com/bid/97621Third Party AdvisoryVDB Entry
- https://confluence.atlassian.com/hc/hipchat-server-security-advisory-2017-04-12-Vendor Advisory
- https://jira.atlassian.com/browse/HCPUB-2903Issue TrackingPatch
FAQ
What is CVE-2017-7357?
CVE-2017-7357 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Hipchat Server before 2.2.3 allows remote authenticated users with Server Administrator level privileges to execute arbitrary code by importing a file.
How severe is CVE-2017-7357?
CVE-2017-7357 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-7357?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Hipchat Server.