exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Hipchat Remote Code Execution

Hipchat Remote Code Execution
Posted Apr 14, 2017
Authored by Matthew Hart

Hipchat server versions prior to 2.2.3 suffer from a remote code execution vulnerability that can be leveraged via Administrative Imports.

tags | advisory, remote, code execution
advisories | CVE-2017-7357
SHA-256 | 607fef099ad5faf68b7433b02457043b6d6c288f2e724d183ad5b65fb66f406b

Hipchat Remote Code Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


CVE ID:

* CVE-2017-7357.


Product: Hipchat Server.

Affected Hipchat Server product versions:
All versions < 2.2.3


Fixed Hipchat Server product versions:
2.2.3



Summary:
This advisory discloses a critical severity security vulnerability
that was introduced in version 1.0 of Hipchat Server. Versions of
Hipchat Server starting with versions of Hipchat Server from 1.0 but
less than 2.2.3 (the fixed version), are affected by this
vulnerability. are affected by this vulnerability.

HipChat Cloud instances aren't affected by the issue described in this email.

Customers who have upgraded Hipchat Server to version 2.2.3 are not affected.

Customers who have downloaded and installed any version less than
2.2.3 please upgrade your Hipchat Server installations immediately to
fix this vulnerability.


Remote Code Execution via Administrative Imports (CVE-2017-7357)

Severity:
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or
low.
This is an independent assessment and you should evaluate its
applicability to your own IT environment.


Description:

An attacker with Server Administrator level privileges could gain
Remote Code Execution via a malicious file importation.
All versions of Hipchat Server starting with versions of Hipchat
Server from 1.0 but less than 2.2.3 (the fixed version), are affected
by this vulnerability. are affected by this vulnerability. are
affected by this vulnerability. This issue can be tracked at:
https://jira.atlassian.com/browse/HCPUB-2903 .


Fix:

To address this issue, we've released the following versions containing a fix:

* Hipchat Server version 2.2.3

Remediation:

Upgrade Hipchat Server to version 2.2.3 or higher.

The vulnerabilities and fix versions are described above. If affected,
you should upgrade to the latest version immediately.




For a full description of the latest version of Hipchat Server, see
the release notes found at
https://confluence.atlassian.com/display/hc/hipchat+server+Release+Notes.
You can download the latest version of Hipchat Server from the
download centre found at https://www.hipchat.com/server/get-it.


Support:
If you have questions or concerns regarding this advisory, please
raise a support request at https://support.atlassian.com/.

-----BEGIN PGP SIGNATURE-----

iQIcBAEBAgAGBQJY7s+IAAoJECQgl6K8UnagCzYP/jp7PVaYUFs0Kr1EVeXPWojS
tdsgvoAWyOCpmAvozQKflRHKQHDv2Kaw7x4fwQgGH2omWUcfECFNv3Xg679ormRJ
9kTWoEWmO6eZHy89qdpnsPmveHIloiIHoLui5ryjC+1zqE/EC6IxrqmLyIi3eYyF
Qgr3cymuVh6xjpt3lvtZACtOheI9QYxikGb2D6RzMZKP5tRfVBz9wvhKnqUYhpJq
UTWXw5St3SDVfw8B3YVJy4penp9EXi/+aia3XZ91hzQYqwmGtUnbLwbghysdus+Y
sFEqV5EB1MG0ycwaB51lVPzSukmANeM9vnd2cwO5wdiwPBdME6NoxSpM1IT73WqP
I3I7mUvJbPaaKFK78qX+045TthNef7lzbEuyPy6jISHVLRu+jA2JD+DMb67Kragx
cw0O+/imh+SlVqBjdyxKpJxQdqZ8l6izDJfBHXoimlpWcq46c6oZ1EOdR9XOhnkv
BCF+uhBrOBs7iewd+nimeiw5BsX5e21UZlm7dMSmUqP1X/kD6iTvJL0k2fDtySAm
ZbLIKyhxsakAgPzvxAV0eab5jtVoalmGzJomJGfdmIGu8VI5Pcc0YhJM/YAvFki0
34xRSWZAUCUraWwKCpQL8peGMa8Xp8OlHzhVb/v2HTLbGZst+Zal1JaaleJtAyl9
ur1lgl0vPAU3iSjKmMRL
=aGWJ
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close