Vulnerability Description
Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atlassian | Sourcetree | <= 2.5c |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2017/05/03/5Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2017/May/10Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/98329Third Party AdvisoryVDB Entry
- https://www.youtube.com/watch?v=SQ1_Ht-0BdoThird Party Advisory
- http://openwall.com/lists/oss-security/2017/05/03/5Mailing ListThird Party Advisory
- http://seclists.org/fulldisclosure/2017/May/10Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/98329Third Party AdvisoryVDB Entry
- https://www.youtube.com/watch?v=SQ1_Ht-0BdoThird Party Advisory
FAQ
What is CVE-2017-8768?
CVE-2017-8768 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree:...
How severe is CVE-2017-8768?
CVE-2017-8768 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-8768?
Check the references section above for vendor advisories and patch information. Affected products include: Atlassian Sourcetree.