Bamboo Security Advisory 2012-08-28
This advisory announces a security vulnerability that we have found in Bamboo and fixed in a recent version of Bamboo.
- Customers who have downloaded and installed Bamboo should upgrade their existing Bamboo installations to fix this vulnerability.
- Atlassian OnDemand are not affected by any of the issues described in this advisory.
Atlassian is committed to improving product security. The vulnerability listed in this advisory has been discovered by Atlassian, unless noted otherwise. The reporter may also have requested that we do not credit them.
If you have questions or concerns regarding this advisory, please raise a support request at http://support.atlassian.com/.
In this advisory:
OGNL Injection Vulnerability
Atlassian rates the severity level of this vulnerability as Critical, according to the scale published in Severity Levels for Security Issues. The scale allows us to rank the severity as critical, high, moderate or low.
This is an independent assessment and you should evaluate its applicability to your own IT environment.
We have identified and fixed a vulnerability caused by the way WebWorks/Struts and Freemarker templates are used in Bamboo. The vulnerability allows a non-authenticated user to execute arbitrary Java methods in the JVM hosting the Bamboo application. This can be used to execute OS commands as the JVM user.
This vulnerability has been fixed in Bamboo 4.1. A patch is available for Bamboo 3.0 and above
|Elevation of privileges|
|- BAM-12066Getting issue details... STATUS|
If you cannot upgrade immediately, you should disable public access to your Bamboo instance to mitigate the risk of this vulnerability.
The vulnerabilities and fix versions are described in the 'Description' section above.
We recommend that you upgrade to the latest version of Bamboo, if possible. For a full description of the latest version of Bamboo, see the release notes. You can download the latest version of Bamboo from the download centre.