CVE-2024-21697

This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9 Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20 See the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]). This vulnerability was reported via our Penetration Testing program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:sourcetree:3.4.19:*:*:*:*:windows:*:*
cpe:2.3:a:atlassian:sourcetree:4.2.8:*:*:*:*:macos:*:*

History

11 Feb 2025, 21:24

Type Values Removed Values Added
Summary
  • (es) Esta vulnerabilidad de ejecución remota de código (RCE) de gravedad alta se introdujo en las versiones 4.2.8 de Sourcetree para Mac y 3.4.19 de Sourcetree para Windows. Esta vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 8,8, permite a un atacante no autenticado ejecutar código arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacción del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la última versión. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac 4.2: actualice a una versión mayor o igual a la 4.2.9 Sourcetree para Windows 3.4: actualice a una versión mayor o igual a la 3.4.20 Consulte las notas de la versión ([https://www.sourcetreeapp.com/download-archives]). Puede descargar la última versión de Sourcetree para Mac y Sourcetree para Windows desde el centro de descargas ([https://www.sourcetreeapp.com/download-archives]). Esta vulnerabilidad fue reportada a través de nuestro programa de pruebas de penetración.
CPE cpe:2.3:a:atlassian:sourcetree:3.4.19:*:*:*:*:windows:*:*
cpe:2.3:a:atlassian:sourcetree:4.2.8:*:*:*:*:macos:*:*
First Time Atlassian sourcetree
Atlassian
References () https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091 - () https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091 - Vendor Advisory
References () https://jira.atlassian.com/browse/SRCTREE-8168 - () https://jira.atlassian.com/browse/SRCTREE-8168 - Vendor Advisory
CWE NVD-CWE-noinfo

19 Nov 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-19 19:15

Updated : 2025-02-11 21:24


NVD link : CVE-2024-21697

Mitre link : CVE-2024-21697

CVE.ORG link : CVE-2024-21697


JSON object : View

Products Affected

atlassian

  • sourcetree