Vulnerability Details : CVE-2014-9757
The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message.
Vulnerability category: Input validation
Products affected by CVE-2014-9757
- cpe:2.3:a:atlassian:bamboo:5.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.8:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.9:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.7:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.6:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:atlassian:bamboo:2.5.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9757
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-9757
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2014-9757
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9757
-
https://jira.atlassian.com/browse/BAM-17099
[BAM-17099] CVE-2014-9757: Deserialisation Through Smack Resulting in Remote Code Execution Vulnerability - Create and track feature requests for Atlassian products.Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/537347/100/0/threaded
SecurityFocus
-
https://confluence.atlassian.com/bamboo/bamboo-security-advisory-2016-01-20-794376535.html
Bamboo Security Advisory 2016-01-20 - Atlassian DocumentationVendor Advisory
-
http://packetstormsecurity.com/files/135352/Bamboo-Deserialization-Missing-Authentication-Checks.html
Bamboo Deserialization / Missing Authentication Checks ≈ Packet Storm
Jump to