CVE-2017-16859
https://notcve.org/view.php?id=CVE-2017-16859
The review attachment resource in Atlassian Fisheye and Crucible before version 4.3.2, from version 4.4.0 before 4.4.3 and before version 4.5.0 allows remote attackers to read files contained within context path of the running application through a path traversal vulnerability in the command parameter. El recurso review attachment en Atlassian Fisheye y Crucible en versiones anteriores a la 4.3.2, desde la 4.4.0 hasta la 4.4.3 y en versiones anteriores a la 4.5.0 permite que los atacantes remotos lean archivos contenidos en la ruta context de la aplicación en ejecución mediante una vulnerabilidad de salto de directorio en el parámetro command. • http://www.securityfocus.com/bid/104578 https://jira.atlassian.com/browse/CRUC-8212 https://jira.atlassian.com/browse/FE-7061 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2018-5228
https://notcve.org/view.php?id=CVE-2018-5228
The /browse/~raw resource in Atlassian Fisheye and Crucible before version 4.5.3 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the handling of response headers. El recurso /browse/~raw en Atlassian FishEye y Crucible, en versiones anteriores a la 4.5.3, permite que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) en la gestión de cabeceras de respuesta. • http://www.securityfocus.com/bid/104006 https://jira.atlassian.com/browse/CRUC-8201 https://jira.atlassian.com/browse/FE-7035 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-5223
https://notcve.org/view.php?id=CVE-2018-5223
Fisheye and Crucible did not correctly check if a configured Mercurial repository URI contained values that the Windows operating system may consider argument parameters. An attacker who has permission to add a repository in Fisheye or Crucible can execute code of their choice on systems that run a vulnerable version of Fisheye or Crucible on the Windows operating system. All versions of Fisheye and Crucible before 4.4.6 (the fixed version for 4.4.x) and from 4.5.0 before 4.5.3 (the fixed version for 4.5.x) are affected by this vulnerability. Fisheye y Crucible no comprobaban correctamente si un URI de repositorio Mercurial configurado contenía valores que el sistema operativo de Windows podría considerar como parámetros de argumento. Un atacante que tenga permiso para añadir un repositorio en Fisheye o Crucible puede ejecutar código de su elección en sistemas que ejecutan una versión vulnerable de Fisheye y Crucible en el sistema operativo Windows. • http://www.securityfocus.com/bid/103665 https://confluence.atlassian.com/x/Zi5sO https://confluence.atlassian.com/x/aS5sO https://jira.atlassian.com/browse/CRUC-8181 https://jira.atlassian.com/browse/FE-7014 • CWE-20: Improper Input Validation •
CVE-2017-18094
https://notcve.org/view.php?id=CVE-2017-18094
Various resources in Atlassian Fisheye and Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allow remote attackers with administrative privileges to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the base path setting of a configured file system repository. Varios recursos en Atlassian Fisheye y Crucible en versiones anteriores a la 4.4.3 (la versión parcheada para 4.4.x) y 4.5.0 permiten que atacantes remotos con privilegios administrativos inyecten código HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) a través de la configuración de ruta base de un repositorio de sistema de archivos configurado. • https://jira.atlassian.com/browse/CRUC-8177 https://jira.atlassian.com/browse/FE-7010 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-18090
https://notcve.org/view.php?id=CVE-2017-18090
Various resources in Atlassian Fisheye before version 4.5.1 (the fixed version for 4.5.x) and before version 4.6.0 allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the name of a commit author. Varios recursos en Atlassian Fisheye en versiones anteriores a la 4.5.1 (la versión solucionada para 4.5.x) y en versiones anteriores a la 4.6.0 permiten que atacantes remotos inyecten HTML o JavaScript arbitrario mediante una vulnerabilidad Cross-Site Scripting (XSS) en nombre de un autor de commit. • http://www.securityfocus.com/bid/103076 https://jira.atlassian.com/browse/FE-7000 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •