This File Inclusion vulnerability, with a CVSS Score of 8.1, allows an authenticated attacker to get the application to display the contents of a local file, or execute a different files already stored locally on the server which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires no user interaction.
Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE
See the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives).
This vulnerability was reported via our Bug Bounty program.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19303 | This High severity File Inclusion vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 and 9.6.0 of Bamboo Data Center and Server. This File Inclusion vulnerability, with a CVSS Score of 8.1, allows an authenticated attacker to get the application to display the contents of a local file, or execute a different files already stored locally on the server which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires no user interaction. Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives). This vulnerability was reported via our Bug Bounty program. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 14 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-98 |
Thu, 20 Feb 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Atlassian bamboo
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Atlassian bamboo
|
|
| Metrics |
cvssV3_1
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-98 |
Thu, 24 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Atlassian
Atlassian bamboo Data Center Atlassian bamboo Server |
|
| CPEs | cpe:2.3:a:atlassian:bamboo_data_center:*:*:*:*:*:*:*:* cpe:2.3:a:atlassian:bamboo_server:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Atlassian
Atlassian bamboo Data Center Atlassian bamboo Server |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: atlassian
Published:
Updated: 2025-03-14T16:02:45.304Z
Reserved: 2024-01-01T00:05:33.847Z
Link: CVE-2024-21687
Updated: 2024-08-01T22:27:36.189Z
Status : Modified
Published: 2024-07-16T21:15:10.257
Modified: 2025-03-14T16:15:28.963
Link: CVE-2024-21687
No data.
OpenCVE Enrichment
No data.
EUVD