Sourcetree Remote Code Execution

2018.07.25
Risk: High
Local: No
Remote: Yes
CWE: N/A

This email refers to the advisory found at https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-07-18-953674465.html . CVE ID: * CVE-2018-11235. * CVE-2018-13385. * CVE-2018-13386. Product: Sourcetree. Affected Sourcetree product versions: * for macOS, 1.0b2 <= version < 2.7.6 * for Windows, 0.5.1.0 <= version < 2.6.10 Fixed Sourcetree product versions: * for macOS, Sourcetree 2.7.6 has been released with a fix for these issues. * for Windows, Sourcetree 2.6.10 has been released with a fix for these issues. Summary: This advisory discloses critical severity security vulnerabilities. Versions of Sourcetree are affected by these vulnerabilities. Customers who have upgraded Sourcetree to version 2.7.6 (Sourcetree for macOS) or 2.6.10 (Sourcetree for Windows) are not affected. Customers who have downloaded and installed Sourcetree >= 1.0b2 but less than 2.7.6 (the fixed version for macOS) or who have downloaded and installed Sourcetree >= 0.5.1.0 but less than 2.6.10 (the fixed version for Windows) please upgrade your Sourcetree installations immediately to fix these vulnerabilities. Sourcetree for macOS - Git submodules vulnerability (CVE-2018-11235) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: The embedded version of Git used in Sourcetree for macOS was vulnerable to CVE-2018-11235. An attacker can exploit this issue if they can commit to a Git repository linked in Sourcetree for macOS or that has been recursively cloned or if a user interacts with a submodule. This allows them to execute arbitrary code on systems running a vulnerable version of Sourcetree for macOS. Versions of Sourcetree for macOS starting with version 1.02b before version 2.7.4 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREE-5845 . Sourcetree for Windows - Git submodules vulnerability (CVE-2018-11235) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: The embedded version of Git used in Sourcetree for Windows was vulnerable to CVE-2018-11235. An attacker can exploit this issue if they can commit to a Git repository linked in Sourcetree for Windows or that has been recursively cloned or if a user interacts with a submodule. This allows them to execute arbitrary code on systems running a vulnerable version of Sourcetree for Windows. Versions of Sourcetree for Windows starting with version 0.5.1.0 before version 2.6.10 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREEWIN-8882 . Sourcetree for macOS - Argument injection via Mercurial repository filenames (CVE-2018-13385) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: There was an argument injection vulnerability in Sourcetree for macOS via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for macOS before version 2.7.6 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREE-5846 . Sourcetree for Windows - Argument injection via Mercurial repository filenames (CVE-2018-13386) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: There was an argument injection vulnerability in Sourcetree for Windows via filenames in Mercurial repositories. An attacker with permission to commit to a Mercurial repository linked in Sourcetree for Windows is able to exploit this issue to gain code execution on the system. Versions of Sourcetree for Windows before version 2.6.10 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREEWIN-8884 . Fix: To address these issues, we've released the following versions containing a fix: * Sourcetree for macOS version 2.7.6 * Sourcetree for Windows version 2.6.10 Remediation: Upgrade Sourcetree for Windows to version 2.6.10 or higher. The vulnerabilities and fix versions are described above. If affected, you should upgrade to the latest version immediately. If you are running Sourcetree macOS and cannot upgrade to 2.6.10 (Sourcetree for Windows), upgrade to version 2.7.6. For a full description of the latest version of Sourcetree, see the release notes found at https://www.sourcetreeapp.com/update/releasenotes/2.7.6.html. You can download the latest version of Sourcetree from the download centre found at https://www.sourcetreeapp.com/. Acknowledgements: Atlassian would like to credit Etienne Stalmans and Terry Zhang at Tophant for reporting these issues to us.

References:

https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-07-18-953674465.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top