CVE-2017-14589

It was possible for double OGNL evaluation in FreeMarker templates through Struts FreeMarker tags to occur. An attacker who has restricted administration rights to Bamboo or who hosts a website that a Bamboo administrator visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Bamboo. All versions of Bamboo before 6.1.6 (the fixed version for 6.1.x) and from 6.2.0 before 6.2.5 (the fixed version for 6.2.x) are affected by this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:13

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/102188 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102188 - Third Party Advisory, VDB Entry
References () https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html - Vendor Advisory () https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-12-13-939939816.html - Vendor Advisory
References () https://jira.atlassian.com/browse/BAM-18842 - Issue Tracking, Vendor Advisory () https://jira.atlassian.com/browse/BAM-18842 - Issue Tracking, Vendor Advisory

Information

Published : 2017-12-13 15:29

Updated : 2024-11-21 03:13


NVD link : CVE-2017-14589

Mitre link : CVE-2017-14589

CVE.ORG link : CVE-2017-14589


JSON object : View

Products Affected

atlassian

  • bamboo
CWE
CWE-20

Improper Input Validation