Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

Come for the products,
stay for the community

The Atlassian Community can help you and your team get more value out of Atlassian products and practices.

Atlassian Community about banner
4,414,324
Community Members
 
Community Events
170
Community Groups

Sourcetree for Windows - CVE-2019-11582 - Remote Code Execution vulnerability

A vulnerability has been published today in regards to Sourcetree for Windows.  The goal of this article is to give you a summary of information we have gathered from Atlassian Community as a starting point for asking further questions on Community if you need.

 

Summary of affected versions:

Atlassian recommends all Sourcetree Windows clients using versions:

0.5a <= version <= 3.1.2

upgrade immediately to 3.1.3 which you can download from https://www.sourcetreeapp.com.

Note: Sourcetree for Mac versions are NOT affected by this vulnerability.

 

Severity

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.

This is our assessment and you should evaluate its applicability to your own IT environment.

 

Description

There was a remote code execution vulnerability in SourceTree for Windows via the URI handlers. A remote, unauthenticated attacker was required to convince a user to interact with a crafted URL in order to exploit the vulnerability. With user interaction, the attacker gained remote code execution on the target system.

All versions of Sourcetree for Windows up to and including 3.1.2 are affected by this vulnerability.  More details on this can be found in the KB Sourcetree Security Advisory 2019-06-05 and in the bug ticket SRCTREEWIN-11942.

 

What You Need to Do

Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of Sourcetree for Windows, see the release notesDownload the latest version of Sourcetree.

Upgrade Sourcetree for Windows to version 3.1.3 or higher.

 

Mitigation

  • Atlassian recommends upgrading Sourcetree Windows to version 3.1.3 or higher.
  • Alternatively, for lower versions, please uncheck the Use this version of Sourcetree for URI association option under Tools > Options

 

Asking questions

To make sure we can organize and reply to questions about this security advisory, this post is locked. We ask that you please create a new question using this link which will help us ensure that your question is not lost among other replies.

0 comments

Comments for this post are closed

Community moderators have prevented the ability to post new comments.

TAGS

Atlassian Community Events