[Forgot Password]
Login  Register Subscribe

24003

 
 

131517

 
 

106747

 
 

909

 
 

84817

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2017-8907Date: (C)2017-06-16   (M)2018-02-19


Atlassian Bamboo 5.x before 5.15.7 and 6.x before 6.0.1 did not correctly check if a user creating a deployment project had the edit permission and therefore the rights to do so. An attacker who can login to Bamboo as a user without the edit permission for deployment projects is able to use this vulnerability, provided there is an existing plan with a green build, to create a deployment project and execute arbitrary code on an available Bamboo Agent. By default a local agent is enabled; this means that code execution can occur on the system hosting Bamboo as the user running Bamboo.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.8CVSS Score : 6.5
Exploit Score: 2.8Exploit Score: 8.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: LOWAuthentication: SINGLE_INSTANCE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
BID-99090
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html

CPE    47
cpe:/a:atlassian:bamboo:5.7.2
cpe:/a:atlassian:bamboo:5.9.1
cpe:/a:atlassian:bamboo:5.7.1
cpe:/a:atlassian:bamboo:5.1.1
...
CWE    1
CWE-264

© 2013 SecPod Technologies