
====================================================================

                             CERT-Renater

                 Note d'Information No. 2019/VULN100

_____________________________________________________________________

DATE                : 17/04/2019

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Atlassian Sourcetree versions prior
                                       to 3.1.1, 3.0.17.

=====================================================================
https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2018-03-06
_____________________________________________________________________

This email refers to the advisory found at
https://confluence.atlassian.com/display/SOURCETREEKB/Sourcetree+Security+Advisory+2018-03-06
.


CVE ID:

* CVE-2018-17456.
* CVE-2018-20234.
* CVE-2018-20235.
* CVE-2018-20236.


Product: Sourcetree.

Affected Sourcetree product versions:

1.2 <= version < 3.1.1
0.5a <= version < 3.0.17


Fixed Sourcetree product versions:

* for macOS, Sourcetree 3.1.1 has been released with a fix for these issues.
* for Windows, Sourcetree 3.0.17 has been released with a fix for these
issues.


Summary:
This advisory discloses critical severity security vulnerabilities.
Versions of Sourcetree  are affected by these vulnerabilities.


Customers who have upgraded Sourcetree to version 3.1.1 (Sourcetree for
macOS) or 3.0.17 (Sourcetree for Windows) are not affected.

Customers who have downloaded and installed Sourcetree >= 1.2 but less
than 3.1.1 (the fixed version for macOS) or who have downloaded and
installed Sourcetree >= 0.5a but less than 3.0.17 (the fixed version for
Windows) please upgrade your Sourcetree installations immediately to fix
these vulnerabilities.


Sourcetree for macOS - Git submodules vulnerability (CVE-2018-17456)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your
own IT environment.

Description:

The embedded version of Git used in Sourcetree for macOS was vulnerable
to CVE-2018-17456. An attacker can exploit this issue if they can commit
to a Git repository linked in Sourcetree for macOS. This allows them to
execute arbitrary code on systems running a vulnerable version of
Sourcetree for macOS.
Versions of Sourcetree for macOS starting with version 1.2 before
version 3.1.1 are affected by this vulnerability. This issue can be
tracked at:
https://jira.atlassian.com/browse/SRCTREE-6394 .


Sourcetree for Windows - Git submodules vulnerability (CVE-2018-17456)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your
own IT environment.

Description:

The embedded version of Git used in Sourcetree for Windows was
vulnerable to CVE-2018-17456. An attacker can exploit this issue if they
can commit to a Git repository linked in Sourcetree for Windows. This
allows them to execute arbitrary code on systems running a vulnerable
version of Sourcetree for Windows.
Versions of Sourcetree for Windows starting with version 0.5a before
version 3.0.17 are affected by this vulnerability. This issue can be
tracked at:
https://jira.atlassian.com/browse/SRCTREEWIN-11292 .


Sourcetree for macOS - Mercurial hooks vulnerability (CVE-2018-20234)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your
own IT environment.

Description:

There was an argument injection vulnerability in Sourcetree for macOS
via filenames in Mercurial repositories. A remote attacker with
permission to commit to a Mercurial repository linked in Sourcetree for
macOS is able to exploit this issue to gain code execution on the
system.
Versions of Sourcetree for macOS starting with version 1.2 before
version 3.1.1 are affected by this vulnerability. This issue can be
tracked at:
https://jira.atlassian.com/browse/SRCTREE-6391 .


Sourcetree for Windows - Mercurial hooks vulnerability (CVE-2018-20235)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your
own IT environment.

Description:

There was an argument injection vulnerability in Sourcetree for Windows
via filenames in Mercurial repositories. A remote attacker with
permission to commit to a Mercurial repository linked in Sourcetree for
Windows is able to exploit this issue to gain code execution on the
system.
Versions of Sourcetree for Windows starting with version 0.5a before
version 3.0.15 are affected by this vulnerability. This issue can be
tracked at:
https://jira.atlassian.com/browse/SRCTREEWIN-11289 .


Sourcetree for Windows - URI handling vulnerability (CVE-2018-20236)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your
own IT environment.

Description:

There was an command injection vulnerability in Sourcetree for Windows
via URI handling. A remote attacker could send a malicious URI to a
victim using Sourcetree for Windows to exploit this issue to gain code
execution on the system.
Versions of Sourcetree for Windows starting with version 0.5a before
version 3.0.15 are affected by this vulnerability. This issue can be
tracked at:
https://jira.atlassian.com/browse/SRCTREEWIN-11291 .


Fix:

To address these issues, we've released the following versions
containing a fix:

* Sourcetree version 3.1.1 (Sourcetree for macOS)
* Sourcetree version 3.0.17 (Sourcetree for Windows)

Remediation:

Upgrade Sourcetree to version 3.0.17 (Sourcetree for Windows) or higher.

The vulnerabilities and fix versions are described above. If affected,
you should upgrade to the latest version immediately.

If you are running Sourcetree macOS and cannot upgrade to 3.0.17
(Sourcetree for Windows), upgrade to version 3.1.1.


For a full description of the latest version of Sourcetree for macOS,
see the release notes found at
https://product-downloads.atlassian.com/software/sourcetree/ReleaseNotes/Sourcetree_3.1.1.html.

For a full description of the latest version of Sourcetree for Windows,
see the release notes found at
https://product-downloads.atlassian.com/software/sourcetree/windows/ga/ReleaseNotes_3.0.17.html.

You can download the latest version of Sourcetree from the download
centre found
at https://www.sourcetreeapp.com/.


Acknowledgements:
Atlassian would like to credit Terry Zhang (pnig0s) at Tophant for
reporting these issues to us.

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




