First published: Wed Jul 18 2018(Updated: )
There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS from 1.0b2 before 2.7.6 are affected by this vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
SourceTree | >=1.0<2.7.6 | |
SourceTree | =1.0-beta2 | |
SourceTree | =1.0-beta3 | |
SourceTree | =1.0-beta4 | |
SourceTree | =1.0-beta5 | |
SourceTree | =1.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13385 is rated as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2018-13385, upgrade to the latest version of Atlassian Sourcetree that addresses this vulnerability.
Users of Atlassian Sourcetree for macOS versions between 1.0 and 2.7.6 are affected by CVE-2018-13385.
An attacker can exploit CVE-2018-13385 to gain unauthorized code execution on the affected system.
Yes, the attacker would need permission to commit to a Mercurial repository linked in Sourcetree to exploit CVE-2018-13385.