All the vulnerabilites related to Atlassian - Bamboo
cve-2014-9757
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/537347/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html | x_refsource_CONFIRM | |
https://jira.atlassian.com/browse/BAM-17099 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:55:04.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-17099" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-17099" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "name": "https://jira.atlassian.com/browse/BAM-17099", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-17099" }, { "name": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9757", "datePublished": "2016-02-08T19:00:00", "dateReserved": "2015-11-25T00:00:00", "dateUpdated": "2024-08-06T13:55:04.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-14590
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-18843 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102193 | vdb-entry, x_refsource_BID | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:39.438Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-18843" }, { "name": "102193", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102193" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "from 2.7.0 before 6.1.6 (the fixed version for 6.1.x)" }, { "status": "affected", "version": "from 6.2.0 before 6.2.5" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Bamboo did not check that the name of a branch in a Mercurial repository contained argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan that has a non-linked Mercurialrepository, create or edit a plan when there is at least one linked Mercurial repository that the attacker has permission to use, or commit to a Mercurial repository used by a Bamboo plan which has branch detection enabled can execute code of their choice on systems that run a vulnerable version of Bamboo Server. Versions of Bamboo starting with 2.7.0 before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-18843" }, { "name": "102193", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102193" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-12-12T00:00:00", "ID": "CVE-2017-14590", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "from 2.7.0 before 6.1.6 (the fixed version for 6.1.x)" }, { "version_value": "from 6.2.0 before 6.2.5" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bamboo did not check that the name of a branch in a Mercurial repository contained argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan that has a non-linked Mercurialrepository, create or edit a plan when there is at least one linked Mercurial repository that the attacker has permission to use, or commit to a Mercurial repository used by a Bamboo plan which has branch detection enabled can execute code of their choice on systems that run a vulnerable version of Bamboo Server. Versions of Bamboo starting with 2.7.0 before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-18843", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-18843" }, { "name": "102193", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102193" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-14590", "datePublished": "2017-12-13T15:00:00Z", "dateReserved": "2017-09-19T00:00:00", "dateUpdated": "2024-09-16T22:50:26.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26136
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26136", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:26:49.090400Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T16:43:16.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180).", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:18", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)." } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26136", "datePublished": "2022-07-20T17:25:18.803466Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T16:43:16.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8361
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/537347/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://jira.atlassian.com/browse/BAM-17102 | x_refsource_CONFIRM | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.335Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-17102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-17102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8361", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "name": "https://jira.atlassian.com/browse/BAM-17102", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-17102" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "name": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8361", "datePublished": "2016-02-08T19:00:00", "dateReserved": "2015-11-25T00:00:00", "dateUpdated": "2024-08-06T08:13:32.335Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18081
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-19665 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103087 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.209Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19665" }, { "name": "103087", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103087" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.3.1" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The signupUser resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the value of the csrf token cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-22T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19665" }, { "name": "103087", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103087" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.3.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The signupUser resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the value of the csrf token cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-19665", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19665" }, { "name": "103087", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103087" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18081", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T23:35:48.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-5229
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/539003/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/92057 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BAM-17736 | x_refsource_CONFIRM | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:53:48.695Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160726 July 2016 - Bamboo Server - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/539003/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html" }, { "name": "92057", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92057" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-17736" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Bamboo before 5.11.4.1 and 5.12.x before 5.12.3.1 does not properly restrict permitted deserialized classes, which allows remote attackers to execute arbitrary code via vectors related to XStream Serialization." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160726 July 2016 - Bamboo Server - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/539003/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html" }, { "name": "92057", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92057" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-17736" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5229", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Bamboo before 5.11.4.1 and 5.12.x before 5.12.3.1 does not properly restrict permitted deserialized classes, which allows remote attackers to execute arbitrary code via vectors related to XStream Serialization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160726 July 2016 - Bamboo Server - Critical Security Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/539003/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/138053/Bamboo-Deserialization-Issue.html" }, { "name": "92057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92057" }, { "name": "https://jira.atlassian.com/browse/BAM-17736", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-17736" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-07-20-831660461.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5229", "datePublished": "2016-08-02T16:00:00", "dateReserved": "2016-06-01T00:00:00", "dateUpdated": "2024-08-06T00:53:48.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18082
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-19666 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:47.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19666" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.2.3" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The plan configure branches resource in Atlassian Bamboo before version 6.2.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the name of a branch." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19666" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.2.3" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The plan configure branches resource in Atlassian Bamboo before version 6.2.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the name of a branch." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-19666", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19666" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18082", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T18:38:32.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26137
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.1", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T16:48:52.174175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T17:10:16.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:23", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26137", "datePublished": "2022-07-20T17:25:23.603830Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T17:10:16.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6576
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/536747/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://confluence.atlassian.com/x/Hw7RLg | x_refsource_CONFIRM | |
https://jira.atlassian.com/browse/BAM-16439 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:22:22.274Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20151023 CVE-2015-6576: Bamboo - Deserialisation resulting in remote code execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/536747/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/Hw7RLg" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-16439" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Bamboo 2.2 before 5.8.5 and 5.9.x before 5.9.7 allows remote attackers with access to the Bamboo web interface to execute arbitrary Java code via an unspecified resource." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20151023 CVE-2015-6576: Bamboo - Deserialisation resulting in remote code execution", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/536747/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/Hw7RLg" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-16439" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6576", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bamboo 2.2 before 5.8.5 and 5.9.x before 5.9.7 allows remote attackers with access to the Bamboo web interface to execute arbitrary Java code via an unspecified resource." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20151023 CVE-2015-6576: Bamboo - Deserialisation resulting in remote code execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/536747/100/0/threaded" }, { "name": "https://confluence.atlassian.com/x/Hw7RLg", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/Hw7RLg" }, { "name": "https://jira.atlassian.com/browse/BAM-16439", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-16439" }, { "name": "http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/134065/Bamboo-Java-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6576", "datePublished": "2017-10-02T18:00:00", "dateReserved": "2015-08-21T00:00:00", "dateUpdated": "2024-08-06T07:22:22.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18041
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103071 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BAM-19662 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103071" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19662" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.2.0" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The viewDeploymentVersionJiraIssuesDialog resource in Atlassian Bamboo before version 6.2.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a release." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-20T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103071" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19662" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.2.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The viewDeploymentVersionJiraIssuesDialog resource in Atlassian Bamboo before version 6.2.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a release." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "103071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103071" }, { "name": "https://jira.atlassian.com/browse/BAM-19662", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19662" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18041", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T19:04:12.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-20647 | x_refsource_MISC | |
https://herolab.usd.de/security-advisories/usd-2019-0016/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:44:03", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-11-08T00:00:00", "ID": "CVE-2019-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.0" } ] } }, { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.3.2" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.1" } ] } }, { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.0" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-20647", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "name": "https://herolab.usd.de/security-advisories/usd-2019-0016/", "refsource": "MISC", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15005", "datePublished": "2019-11-08T03:55:12.611106Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T20:31:42.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2926
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/75682 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/49146 | third-party-advisory, x_refsource_SECUNIA | |
http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://osvdb.org/81993 | vdb-entry, x_refsource_OSVDB | |
http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/53595 | vdb-entry, x_refsource_BID | |
http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75697 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:50:05.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "fisheye-crucible-xml-dos(75682)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49146" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81993" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53595" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "fisheye-crucible-xml-dos(75682)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75682" }, { "name": "49146", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49146" }, { "name": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/FISHEYE/FishEye+and+Crucible+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/DOC/Confluence+Security+Advisory+2012-05-17" }, { "name": "81993", "refsource": "OSVDB", "url": "http://osvdb.org/81993" }, { "name": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/CROWD/Crowd+Security+Advisory+2012-05-17" }, { "name": "53595", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53595" }, { "name": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/BAMBOO/Bamboo+Security+Advisory+2012-05-17" }, { "name": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17", "refsource": "CONFIRM", "url": "http://confluence.atlassian.com/display/JIRA/JIRA+Security+Advisory+2012-05-17" }, { "name": "jira-xml-dos(75697)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75697" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2926", "datePublished": "2012-05-22T15:00:00", "dateReserved": "2012-05-22T00:00:00", "dateUpdated": "2024-08-06T19:50:05.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8360
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/537347/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://jira.atlassian.com/browse/BAM-17101 | x_refsource_CONFIRM | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-17101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote attackers to execute arbitrary Java code via serialized data to the JMS port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-17101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote attackers to execute arbitrary Java code via serialized data to the JMS port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160122 January 2016 - Bamboo - Critical Security Advisory", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/537347/100/0/threaded" }, { "name": "https://jira.atlassian.com/browse/BAM-17101", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-17101" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html" }, { "name": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8360", "datePublished": "2016-02-08T19:00:00", "dateReserved": "2015-11-25T00:00:00", "dateUpdated": "2024-08-06T08:13:32.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-5224
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103653 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BAM-19743 | x_refsource_CONFIRM | |
https://confluence.atlassian.com/x/PS9sO | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:26:46.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103653" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19743" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/PS9sO" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "2.7.1", "versionType": "custom" }, { "lessThan": "6.3.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-05T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103653" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19743" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/PS9sO" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-28T00:00:00", "ID": "CVE-2018-5224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "2.7.1" }, { "version_affected": "\u003c", "version_value": "6.3.3" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bamboo did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to create a repository in Bamboo, edit an existing plan in Bamboo that has a non-linked Mercurial repository, or create a plan in Bamboo either globally or in a project using Bamboo Specs can can execute code of their choice on systems that run a vulnerable version of Bamboo on the Windows operating system. All versions of Bamboo starting with 2.7.0 before 6.3.3 (the fixed version for 6.3.x) and from version 6.4.0 before 6.4.1 (the fixed version for 6.4.x) running on the Windows operating system are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "103653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103653" }, { "name": "https://jira.atlassian.com/browse/BAM-19743", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19743" }, { "name": "https://confluence.atlassian.com/x/PS9sO", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/PS9sO" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-5224", "datePublished": "2018-03-29T13:00:00Z", "dateReserved": "2018-01-05T00:00:00", "dateUpdated": "2024-09-16T18:04:23.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-9514
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101269 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:11:02.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html" }, { "name": "101269", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101269" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "from 6.0.0 before 6.0.5" }, { "status": "affected", "version": "from 6.1.0 before 6.1.4" }, { "status": "affected", "version": "from 6.2.0 before 6.2.1" } ] } ], "datePublic": "2017-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-17T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html" }, { "name": "101269", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101269" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "ID": "CVE-2017-9514", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "from 6.0.0 before 6.0.5" }, { "version_value": "from 6.1.0 before 6.1.4" }, { "version_value": "from 6.2.0 before 6.2.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html" }, { "name": "101269", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101269" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-9514", "datePublished": "2017-10-12T13:00:00", "dateReserved": "2017-06-07T00:00:00", "dateUpdated": "2024-08-05T17:11:02.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26067
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21215 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:19.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21215" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "7.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-01-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Affected versions of Atlassian Bamboo allow an unauthenticated remote attacker to view a stack trace that may reveal the path for the home directory in disk and if certain files exists on the tmp directory, via a Sensitive Data Exposure vulnerability in the /chart endpoint. The affected versions are before version 7.2.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Sensitive Data Exposure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-28T01:45:16", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21215" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2021-01-23T00:00:00", "ID": "CVE-2021-26067", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.2.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Affected versions of Atlassian Bamboo allow an unauthenticated remote attacker to view a stack trace that may reveal the path for the home directory in disk and if certain files exists on the tmp directory, via a Sensitive Data Exposure vulnerability in the /chart endpoint. The affected versions are before version 7.2.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Sensitive Data Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21215", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21215" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2021-26067", "datePublished": "2021-01-28T01:45:16.145818Z", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-09-16T18:34:10.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-19661 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103070 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19661" }, { "name": "103070", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103070" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.2.0" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The viewDeploymentVersionCommits resource in Atlassian Bamboo before version 6.2.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a release." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-20T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19661" }, { "name": "103070", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103070" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.2.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The viewDeploymentVersionCommits resource in Atlassian Bamboo before version 6.2.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a release." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-19661", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19661" }, { "name": "103070", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103070" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18040", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T20:16:51.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22516
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
Atlassian | Bamboo Data Center | |
Atlassian | Bamboo Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:48.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573" }, { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-25168" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22516", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:15:23.698292Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-21T14:08:32.586Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 8.1.0" }, { "status": "affected", "version": "\u003e= 8.1.0" }, { "status": "affected", "version": "\u003e= 8.1.1" }, { "status": "affected", "version": "\u003e= 8.1.10" }, { "status": "affected", "version": "\u003e= 8.1.11" }, { "status": "affected", "version": "\u003e= 8.1.12" }, { "status": "affected", "version": "\u003e= 8.1.2" }, { "status": "affected", "version": "\u003e= 8.1.3" }, { "status": "affected", "version": "\u003e= 8.1.4" }, { "status": "affected", "version": "\u003e= 8.1.5" }, { "status": "affected", "version": "\u003e= 8.1.6" }, { "status": "affected", "version": "\u003e= 8.1.7" }, { "status": "affected", "version": "\u003e= 8.1.9" }, { "status": "affected", "version": "\u003e= 8.2.0" }, { "status": "affected", "version": "\u003e= 8.2.1" }, { "status": "affected", "version": "\u003e= 8.2.2" }, { "status": "affected", "version": "\u003e= 8.2.3" }, { "status": "affected", "version": "\u003e= 8.2.4" }, { "status": "affected", "version": "\u003e= 8.2.5" }, { "status": "affected", "version": "\u003e= 8.2.6" }, { "status": "affected", "version": "\u003e= 8.2.7" }, { "status": "affected", "version": "\u003e= 8.2.8" }, { "status": "affected", "version": "\u003e= 8.2.9" }, { "status": "affected", "version": "\u003e= 9.0.0" }, { "status": "affected", "version": "\u003e= 9.0.1" }, { "status": "affected", "version": "\u003e= 9.0.2" }, { "status": "affected", "version": "\u003e= 9.0.3" }, { "status": "affected", "version": "\u003e= 9.1.0" }, { "status": "affected", "version": "\u003e= 9.1.1" }, { "status": "affected", "version": "\u003e= 9.1.2" }, { "status": "affected", "version": "\u003e= 9.1.3" }, { "status": "affected", "version": "\u003e= 9.2.1" }, { "status": "affected", "version": "\u003e= 9.2.3" }, { "status": "affected", "version": "\u003e= 9.2.4" }, { "status": "affected", "version": "\u003e= 9.2.5" }, { "status": "affected", "version": "\u003e= 9.2.6" }, { "status": "affected", "version": "\u003e= 9.3.0" }, { "status": "affected", "version": "\u003e= 9.3.1" }, { "status": "affected", "version": "\u003e= 9.3.2" }, { "status": "affected", "version": "\u003e= 9.3.3" }, { "status": "unaffected", "version": "\u003e= 9.2.7" }, { "status": "unaffected", "version": "\u003e= 9.3.4" } ] }, { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "\u003c 8.1.0" }, { "status": "affected", "version": "\u003e= 8.1.0" }, { "status": "affected", "version": "\u003e= 8.1.1" }, { "status": "affected", "version": "\u003e= 8.1.10" }, { "status": "affected", "version": "\u003e= 8.1.11" }, { "status": "affected", "version": "\u003e= 8.1.12" }, { "status": "affected", "version": "\u003e= 8.1.2" }, { "status": "affected", "version": "\u003e= 8.1.3" }, { "status": "affected", "version": "\u003e= 8.1.4" }, { "status": "affected", "version": "\u003e= 8.1.5" }, { "status": "affected", "version": "\u003e= 8.1.6" }, { "status": "affected", "version": "\u003e= 8.1.7" }, { "status": "affected", "version": "\u003e= 8.1.9" }, { "status": "affected", "version": "\u003e= 8.2.0" }, { "status": "affected", "version": "\u003e= 8.2.1" }, { "status": "affected", "version": "\u003e= 8.2.2" }, { "status": "affected", "version": "\u003e= 8.2.3" }, { "status": "affected", "version": "\u003e= 8.2.4" }, { "status": "affected", "version": "\u003e= 8.2.5" }, { "status": "affected", "version": "\u003e= 8.2.6" }, { "status": "affected", "version": "\u003e= 8.2.7" }, { "status": "affected", "version": "\u003e= 8.2.8" }, { "status": "affected", "version": "\u003e= 8.2.9" }, { "status": "affected", "version": "\u003e= 9.0.0" }, { "status": "affected", "version": "\u003e= 9.0.1" }, { "status": "affected", "version": "\u003e= 9.0.2" }, { "status": "affected", "version": "\u003e= 9.0.3" }, { "status": "affected", "version": "\u003e= 9.1.0" }, { "status": "affected", "version": "\u003e= 9.1.1" }, { "status": "affected", "version": "\u003e= 9.1.2" }, { "status": "affected", "version": "\u003e= 9.1.3" }, { "status": "affected", "version": "\u003e= 9.2.1" }, { "status": "affected", "version": "\u003e= 9.2.3" }, { "status": "affected", "version": "\u003e= 9.2.4" }, { "status": "affected", "version": "\u003e= 9.2.5" }, { "status": "affected", "version": "\u003e= 9.2.6" }, { "status": "affected", "version": "\u003e= 9.3.0" }, { "status": "affected", "version": "\u003e= 9.3.1" }, { "status": "affected", "version": "\u003e= 9.3.2" }, { "status": "affected", "version": "\u003e= 9.3.3" }, { "status": "unaffected", "version": "\u003e= 9.2.7" }, { "status": "unaffected", "version": "\u003e= 9.3.4" } ] } ], "credits": [ { "lang": "en", "value": "a private user" } ], "descriptions": [ { "lang": "en", "value": "This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 8.1.0, 8.2.0, 9.0.0, 9.1.0, 9.2.0, and 9.3.0 of Bamboo Data Center and Server.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.5, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.\r\n\r\nAtlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Bamboo Data Center and Server 9.2: Upgrade to a release greater than or equal to 9.2.7.\r\n JDK 1.8u121+ should be used in case Java 8 used to run Bamboo Data Center and Server. See Bamboo 9.2 Upgrade notes (https://confluence.atlassian.com/bambooreleases/bamboo-9-2-upgrade-notes-1207179212.html)\r\n\r\n Bamboo Data Center and Server 9.3: Upgrade to a release greater than or equal to 9.3.4\r\n\r\nSee the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives]).\r\n\r\nThis vulnerability was discovered by a private user and reported via our Bug Bounty program" } ], "metrics": [ { "cvssV3_0": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T18:00:00.752Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1318881573" }, { "url": "https://jira.atlassian.com/browse/BAM-25168" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2023-22516", "datePublished": "2023-11-21T18:00:00.752Z", "dateReserved": "2023-01-01T00:01:22.332Z", "dateUpdated": "2024-10-21T14:08:32.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18042
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103110 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BAM-19663 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.207Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103110", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103110" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19663" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.3.1" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The update user administration resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to modify user data including passwords via a Cross-site request forgery (CSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-23T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103110", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103110" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19663" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.3.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The update user administration resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to modify user data including passwords via a Cross-site request forgery (CSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "103110", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103110" }, { "name": "https://jira.atlassian.com/browse/BAM-19663", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19663" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18042", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-17T00:32:15.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-14589
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-18842 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102188 | vdb-entry, x_refsource_BID | |
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:34:38.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-18842" }, { "name": "102188", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102188" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "before 6.1.6 (the fixed version for 6.1.x)" }, { "status": "affected", "version": "from 6.2.0 before 6.2.5 (the fixed version for 6.2.x)" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-15T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-18842" }, { "name": "102188", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102188" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-12-12T00:00:00", "ID": "CVE-2017-14589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "before 6.1.6 (the fixed version for 6.1.x)" }, { "version_value": "from 6.2.0 before 6.2.5 (the fixed version for 6.2.x)" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-18842", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-18842" }, { "name": "102188", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102188" }, { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-14589", "datePublished": "2017-12-13T15:00:00Z", "dateReserved": "2017-09-19T00:00:00", "dateUpdated": "2024-09-16T19:10:55.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18080
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-19664 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-19664" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 6.3.1" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The saveConfigureSecurity resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to modify security settings via a Cross-site request forgery (CSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BAM-19664" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-02T00:00:00", "ID": "CVE-2017-18080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo", "version": { "version_data": [ { "version_value": "prior to 6.3.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The saveConfigureSecurity resource in Atlassian Bamboo before version 6.3.1 allows remote attackers to modify security settings via a Cross-site request forgery (CSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Request Forgery (CSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-19664", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BAM-19664" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18080", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-16T20:47:51.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8907
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/99090 | vdb-entry, x_refsource_BID |
▼ | Vendor | Product |
---|---|---|
Atlassian | Atlassian Bamboo |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html" }, { "name": "99090", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99090" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:5.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.12.4:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.13.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.13.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.13.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.15.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.15.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.15.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.15.4:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.15.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bamboo:5.9.7:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "0" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2017-8907", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-16T13:40:30.708020Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-16T13:45:59.898Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Atlassian Bamboo", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "5.0.0 \u003c= version \u003c 5.15.7" }, { "status": "affected", "version": "6.0.0 \u003c= version \u003c 6.0.1" } ] } ], "datePublic": "2017-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Bamboo 5.x before 5.15.7 and 6.x before 6.0.1 did not correctly check if a user creating a deployment project had the edit permission and therefore the rights to do so. An attacker who can login to Bamboo as a user without the edit permission for deployment projects is able to use this vulnerability, provided there is an existing plan with a green build, to create a deployment project and execute arbitrary code on an available Bamboo Agent. By default a local agent is enabled; this means that code execution can occur on the system hosting Bamboo as the user running Bamboo." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-19T09:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html" }, { "name": "99090", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99090" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "ID": "CVE-2017-8907", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atlassian Bamboo", "version": { "version_data": [ { "version_value": "5.0.0 \u003c= version \u003c 5.15.7" }, { "version_value": "6.0.0 \u003c= version \u003c 6.0.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Bamboo 5.x before 5.15.7 and 6.x before 6.0.1 did not correctly check if a user creating a deployment project had the edit permission and therefore the rights to do so. An attacker who can login to Bamboo as a user without the edit permission for deployment projects is able to use this vulnerability, provided there is an existing plan with a green build, to create a deployment project and execute arbitrary code on an available Bamboo Agent. By default a local agent is enabled; this means that code execution can occur on the system hosting Bamboo as the user running Bamboo." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html" }, { "name": "99090", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99090" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-8907", "datePublished": "2017-06-14T20:00:00", "dateReserved": "2017-05-12T00:00:00", "dateUpdated": "2024-10-16T13:45:59.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201703-0755
Vulnerability from variot
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Apache Struts2 Contains a vulnerability that allows the execution of arbitrary code. Apache Struts2 In Jakarta Multipart parser A vulnerability exists in the execution of arbitrary code that could allow the execution of arbitrary code. The attack code for this vulnerability has been released.By processing a request crafted by a remote third party, arbitrary code could be executed with the privileges of the application. Apache Struts is prone to a remote code-execution vulnerability. Apache Struts 2.3.5 through 2.3.31 and 2.5 through 2.5.10 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03723en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03723en_us Version: 1
HPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-03-29 Last Updated: 2017-03-29
Potential Security Impact: Remote: Code Execution
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified in HPE Aruba ClearPass Policy Manager.
Note: The ClearPass Policy Manager administrative Web interface is affected by the vulnerability. ClearPass Guest, Insight, and Graphite are NOT impacted.
References:
- CVE-2017-5638 - Apache Struts, remote code execution
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- Aruba ClearPass Policy Manager All versions prior to 6.6.5
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5638
9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
9.7 (AV:N/AC:L/Au:N/C:C/I:C/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE Aruba has provided hotfixes for ClearPass 6.6.5, 6.6.4, and 6.5.7. Use one of the following methods to install the appropriate hotfix:
Install the Hotfix Online Using the Software Updates Portal:
-
Open ClearPass Policy Manager and go to Administration - Agents and Software Updates - Software Updates.
-
In the Firmware and Patch Updates area, find the "ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638" or "ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638" patch and click the Download button in its row.
-
Click Install.
-
When the installation is complete and the status is shown as "Needs Restart", proceed to restart ClearPass. After reboot, the status for the patch will be shown as Installed. The ClearPass Policy Manager version number will not change.
Installing the hotfix Offline Using the Patch File from support.arubanetworks.com:
-
Download the "ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638" or "ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638" patch from the Support site.
-
Open the ClearPass Policy Manager Admin UI and go to Administration - Agents and Software Updates - Software Updates.
-
At the bottom of the Firmware and Patch Updates area, click Import Updates and browse to the downloaded patch file. The name and description once imported may differ from the name and remark on the support site as these were adjusted after posting. This is purely a cosmetic discrepancy.
-
Click Install.
-
When the installation is complete and the status is shown as Needs Restart, proceed to restart ClearPass. After reboot, the status for the patch will be shown as Installed. The ClearPass Policy Manager version number will not change.
Workarounds
Restrict access to the Policy Manager Admin Web Interface. This can be accomplished by navigating to Administration - Server Manager - Server Configuration - Server-Name - Network - Restrict Access and only allowing non-public or network management networks.
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY Version:1 (rev.1) - 29 March 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQEcBAEBCAAGBQJY3BR/AAoJELXhAxt7SZaiMW8H/0+jWL4Evk+KeqP7aYk1msGp 9ih3F2680VrHVsUbSzul3+svnaWTJUgRe7fUTvsh/Q6bx/Eo86yo8iXGjmzETLtY cTuQrHLySo55Pwua9+89V4e13QkRvQ/UmQPYDMPEk9L7wwU9OF0oCpXHQBuWnw07 mKLZ12HaZqM8vJXgwgJFH77Mf3r5TkGFHsrZ0M+2vvxioJIEfmWV/x4eqtvIy6zS C6CX1M9x4xD442XcFfnH0BHA9RL6LOeYngTPYR7IIycvzpqd8kOWunjs38+IJpFR g49ho/NddeZfDKdJcIdfJ+0f3x2h7FPiVadXu1PzdCckhFHkHmrSlVcRbQZ+1R8= =8ljI -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0755", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.3.30" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.5.8" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.5.7" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.5.5" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.5.2" }, { "model": "struts", "scope": "eq", "trust": 1.9, "vendor": "apache", "version": "2.5.10" }, { "model": "struts", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.5.4" }, { "model": "struts", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.5.3" }, { "model": "struts", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.5.6" }, { "model": "struts", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.5.9" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.31" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.28" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.24" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.5" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.5.1" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.5" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.8" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.7" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.29" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.20" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.16" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.15" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.14" }, { "model": "struts", "scope": "eq", "trust": 1.3, "vendor": "apache", "version": "2.3.12" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.15.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.15.2" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.14.3" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.19" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.21" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.20.3" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.17" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.14.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.28.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.24.2" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.16.2" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.24.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.26" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.16.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.13" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.6" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.14.2" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.9" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.23" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.22" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.20.2" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.16.3" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.25" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.10" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.20.1" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.24.3" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.11" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.15.3" }, { "model": "struts", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.3.27" }, { "model": "struts", "scope": "lte", "trust": 0.8, "vendor": "apache", "version": "2.3.5 from 2.3.31" }, { "model": "struts", "scope": "lte", "trust": 0.8, "vendor": "apache", "version": "2.5 from 2.5.10" }, { "model": "esmpro/servermanager", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "6.10 to 6.16" }, { "model": "infoframe relational store", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": null }, { "model": "istorage", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "hs series 5.0.5" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v4.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v5.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise v5.1" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v4.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v5.0" }, { "model": "staroffice x", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "standard v5.1" }, { "model": "webotx developer", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "\"(with developers studio) v9.3\"" }, { "model": "webotx developer", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "\"(with developers studio) v9.4\"" }, { "model": "hirdb", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "server version 9" }, { "model": "hirdb control manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- server version 9" }, { "model": "vrealize operations manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "vrealize hyperic", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.5" }, { "model": "vcenter server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "horizon desktop as-a-service platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "7.0" }, { "model": "horizon desktop as-a-service platform", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "6.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1.18.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.2.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.1.0" }, { "model": "webcenter sites", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.2.1.0.0" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.4" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2.1" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1" }, { "model": "sterling selling and fulfillment foundation", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.3.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.5" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.5" }, { "model": "connections", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "smsgw v100r003c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smsgw v100r002c11", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "smsgw v100r002c01", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "secospace antiddos8030 v100r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c91", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r007c90", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r007c80", "scope": "eq", "trust": 0.3, "vendor": "huawei", "version": "6000" }, { "model": "imanager neteco v600r008c20", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r008c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r008c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c60spc100", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c50", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "imanager neteco v600r007c11", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v300r001c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r003c10", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r003c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "espace ecs v200r002c00", "scope": null, "trust": 0.3, "vendor": "huawei", "version": null }, { "model": "universal cmdb foundation software cup5", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.22" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.16" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.15" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.14" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.13" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.12" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.10" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.50" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.20" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.10" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.02" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.01" }, { "model": "server automation", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10.00" }, { "model": "virtualized voice browser", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unity connection", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified sip proxy software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified intelligent contact management enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified intelligence center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified contact center express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified contact center enterprise live data server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "-0" }, { "model": "unified contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager im \u0026 presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "socialminer", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime service catalog appliance and virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "packaged contact center enterprise", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hosted collaboration solution for contact center", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "finesse", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "emergency responder", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "hipchat server", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.0" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.11" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.10.1" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.5" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.4" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.3" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.2" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9.1" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.9" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.8.8" }, { "model": "crowd", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "2.8.3" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.15" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.12" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.11" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.10" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.1" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.12.3.1" }, { "model": "bamboo", "scope": "eq", "trust": 0.3, "vendor": "atlassian", "version": "5.11.4.1" }, { "model": "vcenter server 6.5b", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": null }, { "model": "sterling selling and fulfillment foundation 9.5.0-sfp2", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation 9.4.0-sfp3", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation 9.3.0-sfp5", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.2.1-" }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.2.0-" }, { "model": "sterling selling and fulfillment foundation sfp6", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.0-" }, { "model": "virtualized voice browser su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unity connection", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "unified sip proxy software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.1" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "unified intelligent contact management enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "unified intelligence center es03", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified contact center express su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-11.5(1)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-11.0(2)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-10.5(3)" }, { "model": "unified contact center enterprise live data server", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "-10.0(2)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "unified contact center enterprise", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "socialminer su1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "prime license manager 11.5 su1a", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mediasense", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5(1)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.0(2)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.5(3)" }, { "model": "hosted collaboration solution for contact center", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "finesse es2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "11.5" }, { "model": "hipchat server", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.2.2" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.11.1" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.10.3" }, { "model": "crowd", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "2.9.7" }, { "model": "bamboo", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "5.15.3" }, { "model": "bamboo", "scope": "ne", "trust": 0.3, "vendor": "atlassian", "version": "5.14.5" }, { "model": "struts", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.5.10.1" }, { "model": "struts", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.3.32" } ], "sources": [ { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.20.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.24.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.24.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.16.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.24.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.28.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.20.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.16.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.16.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:struts:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-5638" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nike Zheng", "sources": [ { "db": "BID", "id": "96729" } ], "trust": 0.3 }, "cve": "CVE-2017-5638", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2017-5638", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-5638", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-5638", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201703-152", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2017-5638", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. Apache Struts2 Contains a vulnerability that allows the execution of arbitrary code. Apache Struts2 In Jakarta Multipart parser A vulnerability exists in the execution of arbitrary code that could allow the execution of arbitrary code. The attack code for this vulnerability has been released.By processing a request crafted by a remote third party, arbitrary code could be executed with the privileges of the application. Apache Struts is prone to a remote code-execution vulnerability. \nApache Struts 2.3.5 through 2.3.31 and 2.5 through 2.5.10 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03723en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03723en_us\nVersion: 1\n\nHPESBHF03723 rev.1 - HPE Aruba ClearPass Policy Manager, using Apache Struts,\nRemote Code Execution\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2017-03-29\nLast Updated: 2017-03-29\n\nPotential Security Impact: Remote: Code Execution\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified in HPE Aruba ClearPass\nPolicy Manager. \n\n**Note:** The ClearPass Policy Manager administrative Web interface is\naffected by the vulnerability. ClearPass Guest, Insight, and Graphite are NOT\nimpacted. \n\nReferences:\n\n - CVE-2017-5638 - Apache Struts, remote code execution\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - Aruba ClearPass Policy Manager All versions prior to 6.6.5\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2017-5638\n 9.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L\n 9.7 (AV:N/AC:L/Au:N/C:C/I:C/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE Aruba has provided hotfixes for ClearPass 6.6.5, 6.6.4, and 6.5.7. Use\none of the following methods to install the appropriate hotfix:\n\nInstall the Hotfix Online Using the Software Updates Portal:\n \n 1. Open ClearPass Policy Manager and go to Administration - Agents and\nSoftware\n Updates - Software Updates. \n \n 2. In the Firmware and Patch Updates area, find the \"ClearPass 6.5.7\nHotfix\n Patch for CVE-2017-5638\" or \"ClearPass 6.6.4 Hotfix Patch for\nCVE-2017-5638\"\n patch and click the Download button in its row. \n \n 3. Click Install. \n \n 4. When the installation is complete and the status is shown as \"Needs\n Restart\", proceed to restart ClearPass. After reboot, the status for the\n patch will be shown as Installed. The ClearPass Policy Manager version\n number will not change. \n\n \nInstalling the hotfix Offline Using the Patch File from\nsupport.arubanetworks.com:\n \n 1. Download the \"ClearPass 6.5.7 Hotfix Patch for CVE-2017-5638\" or\n \"ClearPass 6.6.4 Hotfix Patch for CVE-2017-5638\" patch from the Support\nsite. \n \n 2. Open the ClearPass Policy Manager Admin UI and go to Administration -\n Agents and Software Updates - Software Updates. \n 3. At the bottom of the Firmware and Patch Updates area, click Import\nUpdates\n and browse to the downloaded patch file. The name and description once\n imported may differ from the name and remark on the support site\n as these were adjusted after posting. This is purely a cosmetic\ndiscrepancy. \n \n 4. Click Install. \n \n 5. When the installation is complete and the status is shown as Needs\nRestart,\n proceed to restart ClearPass. After reboot, the status for the patch will\n be shown as Installed. The ClearPass Policy Manager version number will\n not change. \n\n\nWorkarounds\n- ----------- \nRestrict access to the Policy Manager Admin Web Interface. This can be\naccomplished by navigating to Administration - Server Manager -\nServer Configuration - Server-Name - Network - Restrict Access and\nonly allowing non-public or network management networks. \n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. \n\nHISTORY\nVersion:1 (rev.1) - 29 March 2017 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQEcBAEBCAAGBQJY3BR/AAoJELXhAxt7SZaiMW8H/0+jWL4Evk+KeqP7aYk1msGp\n9ih3F2680VrHVsUbSzul3+svnaWTJUgRe7fUTvsh/Q6bx/Eo86yo8iXGjmzETLtY\ncTuQrHLySo55Pwua9+89V4e13QkRvQ/UmQPYDMPEk9L7wwU9OF0oCpXHQBuWnw07\nmKLZ12HaZqM8vJXgwgJFH77Mf3r5TkGFHsrZ0M+2vvxioJIEfmWV/x4eqtvIy6zS\nC6CX1M9x4xD442XcFfnH0BHA9RL6LOeYngTPYR7IIycvzpqd8kOWunjs38+IJpFR\ng49ho/NddeZfDKdJcIdfJ+0f3x2h7FPiVadXu1PzdCckhFHkHmrSlVcRbQZ+1R8=\n=8ljI\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2017-5638" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "BID", "id": "96729" }, { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=41570", "trust": 0.2, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5638" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5638", "trust": 3.0 }, { "db": "CERT/CC", "id": "VU#834067", "trust": 2.7 }, { "db": "BID", "id": "96729", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "41614", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "41570", "trust": 1.6 }, { "db": "SECTRACK", "id": "1037973", "trust": 1.6 }, { "db": "LENOVO", "id": "LEN-14200", "trust": 1.6 }, { "db": "PACKETSTORM", "id": "141494", "trust": 1.6 }, { "db": "JVN", "id": "JVNVU93610402", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-001621", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-152", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-5638", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142055", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141863", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "id": "VAR-201703-0755", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5 }, "last_update_date": "2024-04-19T23:01:51.687000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WW-3025", "trust": 0.8, "url": "https://issues.apache.org/jira/browse/ww-3025" }, { "title": "Alternate Libraries", "trust": 0.8, "url": "https://cwiki.apache.org/confluence/display/ww/file+upload#fileupload-alternatelibraries" }, { "title": "S2-045: Possible Remote Code Execution when performing file upload based on Jakarta Multipart parser.", "trust": 0.8, "url": "https://struts.apache.org/docs/s2-045.html" }, { "title": "Uses default error key if specified key doesn\u0027t exist (3523064)", "trust": 0.8, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "title": "Uses default error key if specified key doesn\u0027t exist (6b8272c)", "trust": 0.8, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "title": "Content-Type: Malicious - New Apache Struts2 0-day Under Attack", "trust": 0.8, "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "title": "hitachi-sec-2017-110", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-110/index.html" }, { "title": "NV17-013", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv17-013.html" }, { "title": "hitachi-sec-2017-110", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hitachi-sec-2017-110/index.html" }, { "title": "Veritas NetBackup: \u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u304c\u5b9f\u884c\u3055\u308c\u308b\u8106\u5f31\u6027(CVE-2017-5638) (2017\u5e749\u67081\u65e5)", "trust": 0.8, "url": "http://www.fujitsu.com/jp/products/software/resources/condition/security/products-fujitsu/solution/veritas201712.html" }, { "title": "Apache Struts 2 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=67948" }, { "title": "Cisco: Apache Struts2 Jakarta Multipart Parser File Upload Code Execution Vulnerability Affecting Cisco Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170310-struts2" }, { "title": "CVE-2017-5638", "trust": 0.1, "url": "https://github.com/readloud/cve-2017-5638 " }, { "title": "cve-2017-5638", "trust": 0.1, "url": "https://github.com/jrrdev/cve-2017-5638 " }, { "title": "apache-struts-v2-CVE-2017-5638", "trust": 0.1, "url": "https://github.com/cafnet/apache-struts-v2-cve-2017-5638 " }, { "title": "struts-vulnerability-demo", "trust": 0.1, "url": "https://github.com/corpbob/struts-vulnerability-demo " }, { "title": "struts2_cve-2017-5638", "trust": 0.1, "url": "https://github.com/m3ssap0/struts2_cve-2017-5638 " }, { "title": "struts-rce-cve-2017-5638", "trust": 0.1, "url": "https://github.com/riyazwalikar/struts-rce-cve-2017-5638 " }, { "title": "equifax-data-breach", "trust": 0.1, "url": "https://github.com/raul23/equifax-data-breach " }, { "title": "CVE-2017-5638", "trust": 0.1, "url": "https://github.com/colorblindpentester/cve-2017-5638 " }, { "title": "struts2-rce", "trust": 0.1, "url": "https://github.com/sotudeko/struts2-rce " }, { "title": "vuln-struts2-vm", "trust": 0.1, "url": "https://github.com/evolvesecurity/vuln-struts2-vm " }, { "title": "Apache-Struts-2-CVE-2017-5638-Exploit", "trust": 0.1, "url": "https://github.com/dock0d1/apache-struts-2-cve-2017-5638-exploit " }, { "title": "struts2-rce", "trust": 0.1, "url": "https://github.com/rjd3/struts2-rce " }, { "title": "Struts2-045-RCE", "trust": 0.1, "url": "https://github.com/rayscri/struts2-045-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "CNNVD", "id": "CNNVD-201703-152" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "https://www.kb.cert.org/vuls/id/834067" }, { "trust": 1.9, "url": "https://github.com/rapid7/metasploit-framework/issues/8064" }, { "trust": 1.9, "url": "https://cwiki.apache.org/confluence/display/ww/s2-045" }, { "trust": 1.6, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-002.txt" }, { "trust": 1.6, "url": "https://cwiki.apache.org/confluence/display/ww/s2-046" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/96729" }, { "trust": 1.6, "url": "https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/" }, { "trust": 1.6, "url": "https://www.symantec.com/security-center/network-protection-security-advisories/sa145" }, { "trust": 1.6, "url": "http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/" }, { "trust": 1.6, "url": "https://exploit-db.com/exploits/41570" }, { "trust": 1.6, "url": "https://packetstormsecurity.com/files/141494/s2-45-poc.py.txt" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.6, "url": "https://github.com/mazen160/struts-pwn" }, { "trust": 1.6, "url": "https://support.lenovo.com/us/en/product_security/len-14200" }, { "trust": 1.6, "url": "https://struts.apache.org/docs/s2-046.html" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbgn03733en_us" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03723en_us" }, { "trust": 1.6, "url": "https://security.netapp.com/advisory/ntap-20170310-0001/" }, { "trust": 1.6, "url": "https://twitter.com/theog150/status/841146956135124993" }, { "trust": 1.6, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbgn03749en_us" }, { "trust": 1.6, "url": "https://www.exploit-db.com/exploits/41614/" }, { "trust": 1.6, "url": "https://struts.apache.org/docs/s2-045.html" }, { "trust": 1.6, "url": "http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html" }, { "trust": 1.6, "url": "http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1037973" }, { "trust": 1.6, "url": "https://isc.sans.edu/diary/22169" }, { "trust": 1.6, "url": "https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/" }, { "trust": 1.0, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3ba=commit%3bh=352306493971e7d5a756d61780d57a76eb1f519a" }, { "trust": 1.0, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git%3ba=commit%3bh=6b8272ce47160036ed120a48345d9aa884477228" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3cannounce.apache.org%3e" }, { "trust": 1.0, "url": "https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5638" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20170308-struts.html" }, { "trust": 0.8, "url": "https://www.jpcert.or.jp/at/2017/at170009.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93610402/index.html" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5638" }, { "trust": 0.6, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3cannounce.apache.org%3e" }, { "trust": 0.6, "url": "http-vuln-cve2017-5638.html" }, { "trust": 0.6, "url": "https://nmap.org/nsedoc/scripts/" }, { "trust": 0.6, "url": "https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20170316-01-struts2-cn" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03733en_us" }, { "trust": 0.3, "url": "http://www.apache.org/" }, { "trust": 0.3, "url": "http://struts.apache.org/" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-03-10-876857850.html" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1430326" }, { "trust": 0.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170310-struts2" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/crowd/crowd-security-advisory-2017-03-10-876857916.html" }, { "trust": 0.3, "url": "https://confluence.atlassian.com/display/hc/hipchat+server+security+advisory+2017-03-09" }, { "trust": 0.3, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbgn03749en_us" }, { "trust": 0.3, "url": "http://www.huawei.com/en/psirt/security-notices/2017/huawei-sn-20170313-01-struts2-en" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22000444" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg22001736" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2017-0004.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5638" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03723en_us" } ], "sources": [ { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2017-5638" }, { "db": "BID", "id": "96729" }, { "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "db": "PACKETSTORM", "id": "142055" }, { "db": "PACKETSTORM", "id": "141863" }, { "db": "CNNVD", "id": "CNNVD-201703-152" }, { "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-11T00:00:00", "db": "VULMON", "id": "CVE-2017-5638" }, { "date": "2017-03-06T00:00:00", "db": "BID", "id": "96729" }, { "date": "2017-03-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "date": "2017-04-07T18:18:00", "db": "PACKETSTORM", "id": "142055" }, { "date": "2017-03-30T16:04:25", "db": "PACKETSTORM", "id": "141863" }, { "date": "2017-03-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-152" }, { "date": "2017-03-11T02:59:00.150000", "db": "NVD", "id": "CVE-2017-5638" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-5638" }, { "date": "2017-05-26T07:00:00", "db": "BID", "id": "96729" }, { "date": "2017-10-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001621" }, { "date": "2021-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-152" }, { "date": "2023-11-07T02:49:27.957000", "db": "NVD", "id": "CVE-2017-5638" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-152" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache Struts2 Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001621" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "96729" }, { "db": "CNNVD", "id": "CNNVD-201703-152" } ], "trust": 0.9 } }