CVE-2023-22514

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15 See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). This vulnerability was reported via our Penetration Testing program.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*
cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*

History

30 Apr 2025, 15:48

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*
cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*
References () https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380 - () https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380 - Vendor Advisory
References () https://jira.atlassian.com/browse/SRCTREE-8076 - () https://jira.atlassian.com/browse/SRCTREE-8076 - Vendor Advisory, Issue Tracking
First Time Atlassian
Atlassian sourcetree
Summary
  • (es) Esta vulnerabilidad de ejecución remota de código (RCE) de alta gravedad se introdujo en la versión 3.4.14 de Sourcetree para Mac y Sourcetree para Windows. Esta vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 7,8 y un vector CVSS de: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, permite a un atacante no autenticado ejecutar código arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacción del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la última versión. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac y Sourcetree para Windows 3.4: Actualice a una versión posterior o igual a la 3.4.15. Consulte las notas de la versión (https://www.sourcetreeapp.com/download-archives). Puede descargar la última versión de Sourcetree para Mac y Windows desde el centro de descargas (https://www.sourcetreeapp.com/download-archives). Esta vulnerabilidad se reportó a través de nuestro programa de pruebas de penetración.

18 Mar 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References
  • () https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380 -
  • () https://jira.atlassian.com/browse/SRCTREE-8076 -
Summary (en) Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. (en) This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15 See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). This vulnerability was reported via our Penetration Testing program.

16 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 18:15

Updated : 2025-04-30 15:48


NVD link : CVE-2023-22514

Mitre link : CVE-2023-22514

CVE.ORG link : CVE-2023-22514


JSON object : View

Products Affected

atlassian

  • sourcetree