Description
Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-18446 | Bamboo before 6.0.5, 6.1.x before 6.1.4, and 6.2.x before 6.2.1 had a REST endpoint that parsed a YAML file and did not sufficiently restrict which classes could be loaded. An attacker who can log in to Bamboo as a user is able to exploit this vulnerability to execute Java code of their choice on systems that have vulnerable versions of Bamboo. |
References
History
No history.
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2024-08-05T17:11:02.270Z
Reserved: 2017-06-07T00:00:00.000Z
Link: CVE-2017-9514
No data.
Status : Deferred
Published: 2017-10-12T13:29:00.200
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-9514
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD