0day.today - 最大、世界でのデータベースを利用します。
![](/img/logo_green.jpg)
- 私たちは一つのメインのドメインを使用します。http://0day.today
- 材料のほとんどは 完全に無料
- あなたがしたい場合は エクスプロイトを購入 / V.I.P.を取得アクセス または任意の他のサービスのために支払います、
あなたが購入したり、獲得する必要があります金
ログイン このサイトの管理者が使用しています公式の連絡先.詐欺師にご注意!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
次の方法でご連絡することができます:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Atlassian SourceTree 2.5c Client URL Handler Command Injection Vulnerability
Author: redrain Date: 2017-03-02 Version:2.5c and prior Platform: macOS, Windows, Linux Desktop Site: https://www.sourcetreeapp.com Vendor: Atlassian Vendor Notified: 2017-03-02 Technical Details: ======================================== SourceTree v2.5c and prior are affected by a command injection in the handling of sourcetree:// scheme. The cloneRepo action with !(r)ext!-is base on git-remote-ext, The git team's description of the bug was: Some protocols (like git-remote-ext) can execute arbitrary code found in the URL. PoC: sourcetree://cloneRepo/ext::[command injection] Even attacker can exploit it through the browser <html> <head></head> <body> <a href=sourcetree://checkoutRef/ext::id>a</a> </body> </html> There is a simple demo video: https://youtu.be/SQ1_Ht-0Bdo Other: ============================================ and there is the last bugtrack I reported: ``` Activity Your request status changed to Resolved with resolution Tracked Elsewhere. 03/Mar/17 5:35 PMLATEST Alexander Minozhenko Alexander Minozhenko03/Mar/17 5:34 PM Hi rootredrain, Thank you for sending this notification to Atlassian. This is indeed a vulnerability and an issue has been filed on an internal tracker. The issue is SRCTREE-4632. Unfortunately, this issue is not accessible externally, so you will not be able to monitor its progress. Feel free to check with us for updates. redrain redrain02/Mar/17 5:43 PM sourcetree_vuln.7z (9.62 MB) Details02/Mar/17 5:43 PM Product or Service Other Product Version 2.4.1a and earlier Description SourceTree v2.4.1a and earlier are affected by a command injection in the handling of sourcetree:// scheme. The cloneRepo action with !(r)ext!- is base on git-remote-ext, The git team!-s description of the bug was: Some protocols (like git-remote-ext) can execute arbitrary code found in the URL. PoC: sourcetree://cloneRepo/ext::[command injection] Even attacker can exploit it through the browser there is a simple demo in the attachment. Regards, redrain # 0day.today [2024-07-02] #