// For flags

CVE-2024-21687

 

Severity Score

8.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

This High severity File Inclusion vulnerability was introduced in versions 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 and 9.6.0 of Bamboo Data Center and Server. This File Inclusion vulnerability, with a CVSS Score of 8.1, allows an authenticated attacker to get the application to display the contents of a local file, or execute a different files already stored locally on the server which has high impact to confidentiality, high impact to integrity, no impact to availability, and requires no user interaction. Atlassian recommends that Bamboo Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions listed on this CVE See the release notes (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). You can download the latest version of Bamboo Data Center and Server from the download center (https://www.atlassian.com/software/bamboo/download-archives). This vulnerability was reported via our Bug Bounty program.

Esta vulnerabilidad de inclusión de archivos de alta gravedad se introdujo en las versiones 9.0.0, 9.1.0, 9.2.0, 9.3.0, 9.4.0, 9.5.0 y 9.6.0 de Bamboo Data Center and Server. Esta vulnerabilidad de inclusión de archivos, con una puntuación CVSS de 8,1, permite a un atacante autenticado hacer que la aplicación muestre el contenido de un archivo local o ejecutar archivos diferentes ya almacenados localmente en el servidor, lo que tiene un alto impacto en la confidencialidad y un alto impacto en la integridad de la privacidad, no afecta la disponibilidad y no requiere interacción del usuario. Atlassian recomienda que los clientes de Bamboo Data Center y Server actualicen a la última versión; si no puede hacerlo, actualice su instancia a una de las versiones correctoras admitidas especificadas que se enumeran en este CVE. Consulte las notas de la versión (https://confluence.atlassian.com/bambooreleases/bamboo-release-notes-1189793869.html). Puede descargar la última versión de Bamboo Data Center and Server desde el centro de descargas (https://www.atlassian.com/software/bamboo/download-archives). Esta vulnerabilidad se informó a través de nuestro programa Bug Bounty.

*Credits: Bug Bounty
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-01-01 CVE Reserved
  • 2024-07-16 CVE Published
  • 2025-03-14 CVE Updated
  • 2025-04-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Atlassian
Search vendor "Atlassian"
Bamboo
Search vendor "Atlassian" for product "Bamboo"
*-
Affected
Atlassian
Search vendor "Atlassian"
Bamboo Data Center
Search vendor "Atlassian" for product "Bamboo Data Center"
*-
Affected
Atlassian
Search vendor "Atlassian"
Bamboo Server
Search vendor "Atlassian" for product "Bamboo Server"
*-
Affected