There was an command injection vulnerability in Sourcetree for Windows from version 0.5a before version 3.0.10 via URI handling. A remote attacker could send a malicious URI to a victim using Sourcetree for Windows to exploit this issue to gain code execution on the system.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/107401 | third party advisory vdb entry |
https://jira.atlassian.com/browse/SRCTREEWIN-11291 | vendor advisory issue tracking |
https://seclists.org/bugtraq/2019/Mar/30 | mailing list |
http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html |