{"containers":{"cna":{"affected":[{"product":"Atlassian Bamboo","vendor":"Atlassian","versions":[{"status":"affected","version":"5.0.0 <= version < 5.15.7"},{"status":"affected","version":"6.0.0 <= version < 6.0.1"}]}],"datePublic":"2017-06-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"Atlassian Bamboo 5.x before 5.15.7 and 6.x before 6.0.1 did not correctly check if a user creating a deployment project had the edit permission and therefore the rights to do so.  An attacker who can login to Bamboo as a user without the edit permission for deployment projects is able to use this vulnerability, provided there is an existing plan with a green build, to create a deployment project and execute arbitrary code on an available Bamboo Agent.  By default a local agent is enabled; this means that code execution can occur on the system hosting Bamboo as the user running Bamboo."}],"problemTypes":[{"descriptions":[{"description":"Incorrect Permission Check","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-06-19T09:57:01.000Z","orgId":"f08a6ab8-ed46-4c22-8884-d911ccfe3c66","shortName":"atlassian"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html"},{"name":"99090","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/99090"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@atlassian.com","ID":"CVE-2017-8907","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Atlassian Bamboo","version":{"version_data":[{"version_value":"5.0.0 <= version < 5.15.7"},{"version_value":"6.0.0 <= version < 6.0.1"}]}}]},"vendor_name":"Atlassian"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Atlassian Bamboo 5.x before 5.15.7 and 6.x before 6.0.1 did not correctly check if a user creating a deployment project had the edit permission and therefore the rights to do so.  An attacker who can login to Bamboo as a user without the edit permission for deployment projects is able to use this vulnerability, provided there is an existing plan with a green build, to create a deployment project and execute arbitrary code on an available Bamboo Agent.  By default a local agent is enabled; this means that code execution can occur on the system hosting Bamboo as the user running Bamboo."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Incorrect Permission Check"}]}]},"references":{"reference_data":[{"name":"https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html","refsource":"CONFIRM","url":"https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html"},{"name":"99090","refsource":"BID","url":"http://www.securityfocus.com/bid/99090"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T16:48:22.661Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2017-06-14-907283498.html"},{"name":"99090","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/99090"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"CWE-863 Incorrect Authorization"}]}],"affected":[{"vendor":"atlassian","product":"bamboo","cpes":["cpe:2.3:a:atlassian:bamboo:5.0:beta1:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.0:beta3:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.0:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.0:rc1:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.0:beta2:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.0.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.1.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.11.3:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.12.0:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.12.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.12.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.12.4:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.12.5:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.13.0:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.13.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.13.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.0:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.3:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.4.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.14.5:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.15.0:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.15.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.15.3:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.15.4:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.15.5:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.2.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.2.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.3:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.4:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.4.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.4.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.5:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.6:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.6.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.6.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.7:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.7.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.7.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.8:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.8.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.8.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.8.5:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9.1:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9.2:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9.3:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9.4:*:*:*:*:*:*:*","cpe:2.3:a:atlassian:bamboo:5.9.7:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.8,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-16T13:40:30.708020Z","id":"CVE-2017-8907","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-16T13:45:59.898Z"}}]},"cveMetadata":{"assignerOrgId":"f08a6ab8-ed46-4c22-8884-d911ccfe3c66","assignerShortName":"atlassian","cveId":"CVE-2017-8907","datePublished":"2017-06-14T20:00:00.000Z","dateReserved":"2017-05-12T00:00:00.000Z","dateUpdated":"2024-10-16T13:45:59.898Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}