Description
Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18446 | Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo. |
References
History
No history.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-08-05T17:11:02.270Z
Reserved: 2017-06-07T00:00:00.000Z
Link: CVE-2017-9514
No data.
Status : Modified
Published: 2017-10-12T13:29:00.200
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-9514
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD