First published: Wed Mar 28 2018(Updated: )
Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bamboo | >=2.7.0<6.3.3 | |
Atlassian Bamboo | >=6.4.0<6.4.1 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-5224.
The severity of CVE-2018-5224 is critical (8.8).
Atlassian Bamboo versions 2.7.0 to 6.3.3 and versions 6.4.0 to 6.4.1 are affected by CVE-2018-5224.
CVE-2018-5224 does not directly affect Windows.
You can find more information about CVE-2018-5224 in the following references: [Security Focus](http://www.securityfocus.com/bid/103653), [Atlassian Confluence](https://confluence.atlassian.com/x/PS9sO), [Atlassian Jira](https://jira.atlassian.com/browse/BAM-19743).