This High severity Injection and RCE (Remote Code Execution) vulnerability known as CVE-2023-22506 was introduced in version 8.0.0 of Bamboo Data Center.
This Injection and RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.5, allows an authenticated attacker to
modify the actions taken by a system call and execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.
Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 9.2.3 and 9.3.1. See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html|https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Bamboo Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives|https://www.atlassian.com/software/bamboo/download-archives]).
This vulnerability was reported via our Penetration Testing program.
References
Link | Resource |
---|---|
https://jira.atlassian.com/browse/BAM-22400 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
31 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Atlassian bamboo Server
Atlassian bamboo Data Center Atlassian |
|
CPE | cpe:2.3:a:atlassian:bamboo_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:bamboo_server:*:*:*:*:*:*:*:* |
|
CWE | CWE-94 | |
References | (MISC) https://jira.atlassian.com/browse/BAM-22400 - Issue Tracking, Patch, Vendor Advisory |
19 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | This High severity Injection and RCE (Remote Code Execution) vulnerability known as CVE-2023-22506 was introduced in version 8.0.0 of Bamboo Data Center. This Injection and RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.5, allows an authenticated attacker to modify the actions taken by a system call and execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction. Atlassian recommends that you upgrade your instance to latest version. If you're unable to upgrade to latest, upgrade to one of these fixed versions: 9.2.3 and 9.3.1. See the release notes ([https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html|https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html]). You can download the latest version of Bamboo Data Center and Bamboo Server from the download center ([https://www.atlassian.com/software/bamboo/download-archives|https://www.atlassian.com/software/bamboo/download-archives]). This vulnerability was reported via our Penetration Testing program. |
19 Jul 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-19 00:15
Updated : 2024-10-01 17:35
NVD link : CVE-2023-22506
Mitre link : CVE-2023-22506
CVE.ORG link : CVE-2023-22506
JSON object : View
Products Affected
atlassian
- bamboo_data_center
- bamboo_server
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')