CVE-2018-5223

CVSS V2 Medium 6.5 CVSS V3 High 7.2
Description
Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability.
Overview
  • CVE ID
  • CVE-2018-5223
  • Assigner
  • security@atlassian.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2018-03-29T13:29:00
  • Last Modified Date
  • 2018-04-24T12:54:27
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:* 1 OR 4.4.0 4.4.6
cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:* 1 OR 4.5.0 4.5.3
cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:* 1 OR 4.4.0 4.4.6
cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:* 1 OR 4.5.0 4.5.3
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • HIGH
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.2
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.2
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://jira.atlassian.com/browse/FE-7014 Patch Vendor Advisory
https://jira.atlassian.com/browse/CRUC-8181 Patch Vendor Advisory
https://confluence.atlassian.com/x/Zi5sO Vendor Advisory
https://confluence.atlassian.com/x/aS5sO Vendor Advisory
http://www.securityfocus.com/bid/103665 Third Party Advisory VDB Entry
History
Created Old Value New Value Data Type Notes
2022-05-10 18:45:15 Added to TrackCVE
2022-12-03 03:59:57 2018-03-29T13:29Z 2018-03-29T13:29:00 CVE Published Date updated
2022-12-03 03:59:57 2018-04-24T12:54:27 CVE Modified Date updated
2022-12-03 03:59:57 Analyzed Vulnerability Status updated