Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo.
References
Link | Resource |
---|---|
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-10-11-938843921.html | Vendor Advisory |
http://www.securityfocus.com/bid/101269 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-10-12 06:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-9514
Mitre link : CVE-2017-9514
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
atlassian
- bamboo