
CVE-2017-16859
https://notcve.org/view.php?id=CVE-2017-16859
28 Jun 2018 — The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter. El recurso review attachment en Atlassian Fisheye y Crucible en versiones anteriores a la 4.3.2, desde la 4.4.0 hasta la 4.4.3 y en versiones anteriores a la 4.5.0 permite que los atacantes remotos lean archi... • http://www.securityfocus.com/bid/104578 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2018-5228
https://notcve.org/view.php?id=CVE-2018-5228
24 Apr 2018 — The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers. El recurso /browse/~raw en Atlassian FishEye y Crucible, en versiones anteriores a la 4.5.3, permite que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) en la gestión de cabeceras de respuesta. • http://www.securityfocus.com/bid/104006 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2018-5223 – Atlassian Fisheye / Crucible 4.5.2 Code Execution
https://notcve.org/view.php?id=CVE-2018-5223
29 Mar 2018 — Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x)... • http://www.securityfocus.com/bid/103665 • CWE-20: Improper Input Validation •

CVE-2017-18094
https://notcve.org/view.php?id=CVE-2017-18094
22 Mar 2018 — Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository. Varios recursos en Atlassian Fisheye y Crucible en versiones anteriores a la 4.4.3 (la versión parcheada para 4.4.x) y 4.5.0 permiten que atacantes remotos con privilegios administrativos i... • https://jira.atlassian.com/browse/CRUC-8177 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18093
https://notcve.org/view.php?id=CVE-2017-18093
19 Feb 2018 — Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allow remote attackers who have permission to add or modify a repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the location setting of a configured repository. Varios recursos en Atlassian Fisheye y Crucible en versiones anteriores a la 4.4.3 (la versión parcheada para 4.4.x) y anteriores a la 4.5.0 permite que atacantes remotos que t... • http://www.securityfocus.com/bid/103095 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18090
https://notcve.org/view.php?id=CVE-2017-18090
16 Feb 2018 — Various resources in Atlassian Fisheye before version 4.5.1 (the fixed version for 4.5.x) and before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a commit author. Varios recursos en Atlassian Fisheye en versiones anteriores a la 4.5.1 (la versión solucionada para 4.5.x) y en versiones anteriores a la 4.6.0 permiten que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scr... • http://www.securityfocus.com/bid/103076 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18091
https://notcve.org/view.php?id=CVE-2017-18091
16 Feb 2018 — The admin backupprogress action in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and before 4.5.0 allows remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the filename of a backup. La acción de administrador backupprogress en Atlassian Fisheye y Crucicle en versiones anteriores a la 4.4.3 (la versión solucionada para 4.4.x) y en versiones anteriores a la 4.5.0 permite que atacantes remo... • http://www.securityfocus.com/bid/103079 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18034
https://notcve.org/view.php?id=CVE-2017-18034
02 Feb 2018 — The source browse resource in Atlassian Fisheye and Crucible before version 4.5.1 and 4.6.0 allows allows remote attackers that have write access to an indexed repository to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in via a specially crafted repository branch name when trying to display deleted files of the branch. El recurso de exploración de fuentes en Atlassian Fisheye y Crucible en versiones anterores 4.5.1 y 4.6.0 permite a los atacantes remotos que tienen acce... • https://jira.atlassian.com/browse/CRUC-8161 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-18035
https://notcve.org/view.php?id=CVE-2017-18035
02 Feb 2018 — The /rest/review-coverage-chart/1.0/data/

CVE-2017-16861 – Fisheye / Crucible Remote Code Execution
https://notcve.org/view.php?id=CVE-2017-16861
01 Feb 2018 — It was possible for double OGNL evaluation in certain redirect action and in WebWork URL and Anchor tags in JSP files to occur. An attacker who can access the web interface of Fisheye or Crucible or who hosts a website that a user who can access the web interface of Fisheye or Crucible visits, is able to exploit this vulnerability to execute Java code of their choice on systems that run a vulnerable version of Fisheye or Crucible. All versions of Fisheye and Crucible before 4.4.5 (the fixed version for 4.4.... • http://www.securityfocus.com/bid/102971 •