Sourcetree Security Advisory 2019-03-06
March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities
要約 | March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities |
---|---|
勧告のリリース日 | 06 Mar 2019 10:00 AM PDT (Pacific Time, -7 hours) |
製品 |
|
Affected Sourcetree Versions |
|
Fixed Sourcetree Versions |
|
CVE ID |
|
脆弱性の概要
This advisory discloses three critical severity security vulnerabilities in Sourcetree for macOS and Sourcetree for Windows.
Versions of Sourcetree for macOS starting with 1.2 before 3.1.1, and versions of Sourcetree for Windows starting with 0.5a before 3.0.17 are affected by one or more of these vulnerabilities.
Customers who have upgraded to Sourcetree for macOS version 3.1.1 or Sourcetree for Windows version 3.0.17 are not affected. |
Customers who have downloaded and installed Sourcetree for macOS before version 3.1.1 or Sourcetree for Windows before version 3.0.17 are affected. Please upgrade your Sourcetree installations immediately to fix this vulnerability. |
Mercurial hooks vulnerability - CVE-2018-20234 and CVE-2018-20235
深刻度
アトラシアンは、アトラシアンの重大度レベルで公開されているスケールに従って、この脆弱性の重大度レベルを重大として評価しています。このスケールによって、重大度を重大、高度、中度、低度として評価できます。
This is our assessment and you should evaluate how it applies to your own IT environment.
説明
Sourcetree for macOS before version 3.1.1 and Sourcetree for Windows before version 3.0.15 were vulnerable to CVE-2018-20234 and CVE-2018-20235 respectively. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS or Windows is able to exploit this issue to gain code execution on the system.
Versions of Sourcetree for macOS starting with 1.2 before version 3.1.1 are affected by this vulnerability. This issue can be tracked here:
- SRCTREE-6391Argument Injection via Mercurial hooks in Sourcetree for macOS - CVE-2018-20234 CLOSED
Versions of Sourcetree for Windows starting with 0.5a before version 3.0.15 are affected by this vulnerability. This issue can be tracked here:
- SRCTREEWIN-11289Argument Injection via Mercurial hooks in Sourcetree for Windows - CVE-2018-20235 CLOSED
謝辞
Credit for finding this vulnerability goes to Terry Zhang (pnig0s) at Tophant.
修正
We have taken the following steps to address this issue:
Released Sourcetree for Windows version 3.0.15 that contains a fix for this issue.
Released Sourcetree for macOS version 3.1.1 that contains a fix for this issue.
Git submodules vulnerability - CVE-2018-17456
深刻度
アトラシアンは、アトラシアンの重大度レベルで公開されているスケールに従って、この脆弱性の重大度レベルを重大として評価しています。このスケールによって、重大度を重大、高度、中度、低度として評価できます。
This is our assessment and you should evaluate how it applies to your own IT environment.
説明
Sourcetree for macOS before version 3.1.1 and Sourcetree for Windows before version 3.0.17 were both vulnerable to CVE-2018-17456. A remote attacker with permission to commit to a git repository linked in Sourcetree for macOS or Windows is able to exploit this issue to gain code execution on the system.
Versions of Sourcetree for macOS starting with 1.2 before version 3.1.1 are affected by this vulnerability. This issue can be tracked here:
- SRCTREE-6394Input validation vulnerability via Git in Sourcetree for Mac - CVE-2018-17456CLOSEDVersions of Sourcetree for Windows starting with 0.5a before version 3.0.17 are affected by this vulnerability. This issue can be tracked here:
- SRCTREEWIN-11292Input validation vulnerability via Git in Sourcetree for Windows - CVE-2018-17456 CLOSED
謝辞
Credit for finding this vulnerability goes to Terry Zhang (pnig0s) at Tophant.
修正
We have taken the following steps to address this issue:
Released Sourcetree for macOS version 3.1.1 that contains a fix for this issue.
Released Sourcetree for Windows version 3.0.17 that contains a fix for this issue.
URI handling vulnerability - CVE-2018-20236
深刻度
アトラシアンは、アトラシアンの重大度レベルで公開されているスケールに従って、この脆弱性の重大度レベルを重大として評価しています。このスケールによって、重大度を重大、高度、中度、低度として評価できます。
This is our assessment and you should evaluate how it applies to your own IT environment.
説明
Sourcetree for Windows before version 3.0.10 was vulnerable to CVE-2018-20236. A remote attacker able to send a URI to a Sourcetree for Windows user is able to exploit this issue to gain code execution on the system.
Versions of Sourcetree for Windows starting with 0.5a before version 3.0.10 are affected by this vulnerability. This issue can be tracked here:
- SRCTREEWIN-11291Command Injection via URI handling in Sourcetree for Windows - CVE-2018-20236 CLOSED
謝辞
Credit for finding this vulnerability goes to Terry Zhang (pnig0s) at Tophant.
修正
We have taken the following steps to address this issue:
Released Sourcetree for Windows version 3.0.10 that contains a fix for this issue.
What You Need to Do
Upgrade Sourcetree for Windows to version 3.0.17 or higher.
Upgrade Sourcetree for macOS to version 3.1.1 or higher.
Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of Sourcetree for macOS, see the release notes. For a full description of the latest version of Sourcetree for Windows, see the release notes. You can download the latest version of Sourcetree from the Sourcetree website.
サポート
このアドバイザリのメールを受信していないため今後の受信を希望する場合は、https://my.atlassian.com/email にアクセスしてアラート メールにご登録ください。
このアドバイザリに関してご質問や懸念がある場合は、https://support.atlassian.com/ja/ でサポート リクエストを起票してください。
参考
Our SLAs and guarantees for bugfixes. | |
アトラシアンのセキュリティ勧告には重大度レベルと CVE ID が含まれます。重大度レベルは、それぞれの脆弱性についてアトラシアンが独自に計算した CVSS スコアに基づきます。CVSS は業界標準の脆弱性メトリックです。CVSS の詳細を FIRST.org でご確認ください。 | |
Our end of life policy varies for different products. Please refer to the policy for details. |