ID CVE-2018-20234
Summary There was an argument injection vulnerability in Atlassian Sourcetree for macOS from version 1.2 before version 3.1.1 via filenames in Mercurial repositories. A remote attacker with permission to commit to a Mercurial repository linked in Sourcetree for macOS is able to exploit this issue to gain code execution on the system.
References
Vulnerable Configurations
  • cpe:2.3:a:atlassian:sourcetree:1.2.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.2.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.2.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.7:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.7.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.7.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.8:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.8:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.8.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.8.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.9:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.9:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.2.9.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.2.9.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.3.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.3.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.3.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.3.1.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.3.1.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.3.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.3.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.3.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.3.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.1.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.1.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.3.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.4.4.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.4.4.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.5.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.5.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.7:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.7.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.7.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.5.8:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.5.8:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.0.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.0.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.2.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.2.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.2.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.2.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.3.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.6.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.6.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.7.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.7.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.8.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.8.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.8.0.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.8.0.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.8.0.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.8.0.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.8.0.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.8.0.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.8.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.8.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.3.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.5.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.5.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.5.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.5.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.7:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:1.9.8:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:1.9.8:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.7:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.0.5.8:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.0.5.8:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.2.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.2.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.2.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.2.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.2.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.2.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.2.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.2.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.3.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.3.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.3.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.4.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.4.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.5:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.5.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.5.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.5.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.5.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.5.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.5.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.6:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.6.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.6.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.6.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.6.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.6.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.6.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.7:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.7.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.7.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.7.2:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.7.2:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.7.3:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.7.3:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:2.7.4:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:2.7.4:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:3.0:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:3.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:3.0.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:3.0.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:atlassian:sourcetree:3.1:*:*:*:*:macos:*:*
    cpe:2.3:a:atlassian:sourcetree:3.1:*:*:*:*:macos:*:*
CVSS
Base: 9.0 (as of 11-05-2020 - 17:00)
Impact:
Exploitability:
CWE CWE-88
CAPEC
  • OS Command Injection
    In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.
  • Parameter Injection
    An adversary manipulates the content of request parameters for the purpose of undermining the security of the target. Some parameter encodings use text characters as separators. For example, parameters in a HTTP GET message are encoded as name-value pairs separated by an ampersand (&). If an attacker can supply text strings that are used to fill in these parameters, then they can inject special characters used in the encoding scheme to add or modify parameters. For example, if user input is fed directly into an HTTP GET request and the user provides the value "myInput&new_param=myValue", then the input parameter is set to myInput, but a new parameter (new_param) is also added with a value of myValue. This can significantly change the meaning of the query that is processed by the server. Any encoding scheme where parameters are identified and separated by text characters is potentially vulnerable to this attack - the HTTP GET encoding used above is just one example.
  • Using Meta-characters in E-mail Headers to Inject Malicious Payloads
    This type of attack involves an attacker leveraging meta-characters in email headers to inject improper behavior into email programs. Email software has become increasingly sophisticated and feature-rich. In addition, email applications are ubiquitous and connected directly to the Web making them ideal targets to launch and propagate attacks. As the user demand for new functionality in email applications grows, they become more like browsers with complex rendering and plug in routines. As more email functionality is included and abstracted from the user, this creates opportunities for attackers. Virtually all email applications do not list email header information by default, however the email header contains valuable attacker vectors for the attacker to exploit particularly if the behavior of the email client application is known. Meta-characters are hidden from the user, but can contain scripts, enumerations, probes, and other attacks against the user's system.
  • HTTP Parameter Pollution (HPP)
    An attacker overrides or adds HTTP GET/POST parameters by injecting query string delimiters. Via HPP it may be possible to override existing hardcoded HTTP parameters, modify the application behaviors, access and, potentially exploit, uncontrollable variables, and bypass input validation checkpoints and WAF rules.
  • Flash Parameter Injection
    An adversary takes advantage of improper data validation to inject malicious global parameters into a Flash file embedded within an HTML document. Flash files can leverage user-submitted data to configure the Flash document and access the embedding HTML document. These 'FlashVars' are most often passed to the Flash file via URL arguments or from the Object or Embed tag within the embedding HTML document. If these FlashVars are not properly sanitized, an adversary may be able to embed malicious content (such as scripts) into the HTML document. The injected parameters can also provide the adversary control over other objects within the Flash file as well as full control over the parent document's DOM model. As such, this is a form of HTTP parameter injection, but the abilities granted to the Flash document (such as access to a page's document model, including associated cookies) make this attack more flexible. Flash Parameter Injection attacks can also preface further attacks such as various forms of Cross-Site Scripting (XSS) attacks in addition to Session Hijacking attacks.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:C/I:C/A:C
refmap via4
bid 107414
bugtraq 20190320 March 2019 Sourcetree Advisory - Multiple Remote Code Execution Vulnerabilities
confirm https://jira.atlassian.com/browse/SRCTREE-6391
misc http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
Last major update 11-05-2020 - 17:00
Published 08-03-2019 - 18:29
Last modified 11-05-2020 - 17:00
Back to Top