9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%
This vulnerability allows unauthenticated remote attackers to inject code and XML as well as perform directory traversal via
CVE-2017-1000487 - command injection
sonatype-2016-0398 - directory traversal
sonatype-2015-0173 - XML Injection
The affected versions are before version 7.2.2, and before 8.0.0.
It’s build time vulnerability for Bamboo plugin and Bamboo Specs code.
Affected versions:
Fixed versions:
h3. Workaround
h4. For Bamboo plugin code
Use parent pom of version 6.1.2
{code}
<parent>
<groupId>com.atlassian.pom</groupId>
<artifactId>base-pom</artifactId>
<version>6.1.2</version>
</parent>
{code}
h4. For Bamboo Specs Java project
Add these lines to pom.xml
{code}
<build>
<extensions>
<extension>
<groupId>org.apache.maven.wagon</groupId>
<artifactId>wagon-ssh-external</artifactId>
<version>3.4.2</version>
</extension>
</extensions>
</build>
{code}
CPE | Name | Operator | Version |
---|---|---|---|
bamboo data center | le | 7.2.1 | |
bamboo data center | lt | 8.0.0 | |
bamboo data center | lt | 7.2.2 |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.004 Low
EPSS
Percentile
73.0%