First published: Thu May 04 2017(Updated: )
Atlassian SourceTree v2.5c and prior are affected by a command injection in the handling of the sourcetree:// scheme. It will lead to arbitrary OS command execution with a URL substring of sourcetree://cloneRepo/ext:: or sourcetree://checkoutRef/ext:: followed by the command. The Atlassian ID number is SRCTREE-4632.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SourceTree | <=2.5c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8768 is classified as a critical vulnerability due to the potential for arbitrary OS command execution.
To mitigate CVE-2017-8768, update Atlassian SourceTree to version 2.6 or later.
Atlassian SourceTree versions up to and including 2.5c are affected by CVE-2017-8768.
CVE-2017-8768 allows attackers to execute arbitrary commands on the operating system through manipulated URL schemes.
Yes, CVE-2017-8768 can be exploited remotely if a user is tricked into opening a malicious URL.