0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Sourcetree Git Arbitrary Code Execution Vulnerability
Author
Risk
[
Security Risk Critical
]0day-ID
Category
Date add
CVE
Platform
Sourcetree Git Arbitrary Code Execution CVE ID: * CVE-2018-13396. * CVE-2018-13397. Product: Sourcetree. Affected Sourcetree product versions: 1.0b2 <= version < 3.0.0 0.5.1.0 <= version < 3.0.0 Fixed Sourcetree product versions: * for macOS, Sourcetree 3.0.0 has been released with a fix for these issues. * for Windows, Sourcetree 3.0.0 has been released with a fix for these issues. Summary: This advisory discloses critical severity security vulnerabilities. Versions of Sourcetree are affected by these vulnerabilities. Customers who have upgraded Sourcetree to version 3.0.0 (Sourcetree for macOS) or 3.0.0 (Sourcetree for Windows) are not affected. Customers who have downloaded and installed Sourcetree >= 1.0b2 but less than 3.0.0 (the fixed version for macOS) or who have downloaded and installed Sourcetree >= 0.5.1.0 but less than 3.0.0 (the fixed version for Windows), please upgrade your Sourcetree installations immediately to fix these vulnerabilities. Sourcetree for macOS - Git submodules vulnerability (CVE-2018-13396) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: The embedded version of Git used in Sourcetree for macOS was vulnerable to CVE-2018-13396. An attacker can exploit this issue if they can commit to a Git repository linked in Sourcetree for macOS. This allows them to execute arbitrary code on systems running a vulnerable version of Sourcetree for macOS. Versions of Sourcetree for macOS starting with version 1.02b before version 3.0.0 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREE-5985 . Sourcetree for Windows - Git submodules vulnerability (CVE-2018-13397) Severity: Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low. This is our assessment and you should evaluate its applicability to your own IT environment. Description: The embedded version of Git used in Sourcetree for Windows was vulnerable to CVE-2018-13397. An attacker can exploit this issue if they can commit to a Git repository linked in Sourcetree for Windows. This allows them to execute arbitrary code on systems running a vulnerable version of Sourcetree for Windows. Versions of Sourcetree for Windows starting with version 0.5.1.0 before version 3.0.0 are affected by this vulnerability. This issue can be tracked at: https://jira.atlassian.com/browse/SRCTREEWIN-9077 . Fix: To address these issues, we've released the following versions containing a fix: * Sourcetree version 3.0.0 (Sourcetree for macOS) * Sourcetree version 3.0.0 (Sourcetree for Windows) Remediation: Upgrade Sourcetree to version 3.0.0 (macOS or Windows) or higher. The vulnerabilities and fix versions are described above. If affected, you should upgrade to the latest version immediately. For a full description of the latest version of Sourcetree, see the release notes found at https://product-downloads.atlassian.com/software/sourcetree/ReleaseNotes/Sourcetree_3.0.html . You can download the latest version of Sourcetree from the download centre found at https://www.sourcetreeapp.com/ . Acknowledgements: Atlassian would like to credit Terry Zhang at Tophant for reporting these issues to us. # 0day.today [2024-11-15] #