SourceTree Security Advisory 2017-05-10
SourceTree - Command Injection - CVE-2017-8768
Note: As of September 2014 we are no longer issuing binary bug patches, instead we create new maintenance releases for the major versions we are backporting.
Summary | CVE-2017-8768 - Command Injection |
---|---|
Advisory Release Date |
10:00 AM PDT (Pacific Time, -7 hours) |
Products |
|
Affected SourceTree Versions |
|
Fixed SourceTree Versions |
|
CVE ID(s) |
|
Summary of Vulnerability
This advisory discloses a critical security vulnerability in versions of SourceTree for Mac starting with 1.4.0 but before 2.5.1 and SourceTree for Windows starting with 0.8.4b but before 2.0.20.1.
Command Injection (CVE-2017-8768)
Severity
Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your own IT environment.
Description
SourceTree for Mac and Windows are affected by a command injection vulnerability in URI handling. The vulnerability can be triggered through a browser or the SourceTree interface.
Versions of SourceTree for Mac starting with 1.4.0 but before 2.5.1 are affected by this vulnerability. This issue can be tracked here.
Versions of SourceTree for Windows starting with 0.8.4b but before 2.0.20.1 are affected by this vulnerability. This issue can be tracked here.
What You Need to Do
Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of SourceTree, see the release notes for Mac and Windows. You can download the latest versions of SourceTree from the SourceTree website.
Upgrade SourceTree for Mac to version 2.5.1 or higher. Please note that since SourceTree for Mac 2.5.0 Mac OSX 10.11 or later is required.
Upgrade SourceTree for Windows to version 2.0.20.1 or higher.
Support
If you did not receive an email for this advisory and wish to receive such emails in the future, please go to https://my.atlassian.com/email and subscribe to "Product information & updates" for SourceTree. To receive advisories for our other products, please go to https://my.atlassian.com/email and subscribe to relevant alerts.
If you have questions or concerns regarding this advisory, please raise a support request at https://support.atlassian.com/.
Acknowledgements
Atlassian would like to credit Yu Hong for reporting this issue to us.
References
Severity Levels for security issues | Atlassian security advisories include a severity level and a CVE identifier. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can also learn more about CVSS at FIRST.org. |
Was this helpful?
Thanks for your feedback!
Have a question about this article?
Ask our community