{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T23:10:44.417","vulnerabilities":[{"cve":{"id":"CVE-2024-21697","sourceIdentifier":"security@atlassian.com","published":"2024-11-19T19:15:07.937","lastModified":"2025-02-11T21:24:33.417","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 4.2.8 of Sourcetree for Mac and 3.4.19 for Sourcetree for Windows.\r\n\r\nThis RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.8, allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction.\r\n\r\nAtlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\r\n Sourcetree for Mac 4.2: Upgrade to a release greater than or equal to 4.2.9\r\n Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.20\r\n\r\nSee the release notes ([https://www.sourcetreeapp.com/download-archives]). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center ([https://www.sourcetreeapp.com/download-archives]).\r\n\r\nThis vulnerability was reported via our Penetration Testing program."},{"lang":"es","value":"Esta vulnerabilidad de ejecución remota de código (RCE) de gravedad alta se introdujo en las versiones 4.2.8 de Sourcetree para Mac y 3.4.19 de Sourcetree para Windows. Esta vulnerabilidad de ejecución remota de código (RCE), con una puntuación CVSS de 8,8, permite a un atacante no autenticado ejecutar código arbitrario que tiene un alto impacto en la confidencialidad, la integridad y la disponibilidad, y requiere la interacción del usuario. Atlassian recomienda que los clientes de Sourcetree para Mac y Sourcetree para Windows actualicen a la última versión. Si no puede hacerlo, actualice su instancia a una de las versiones corregidas compatibles especificadas: Sourcetree para Mac 4.2: actualice a una versión mayor o igual a la 4.2.9 Sourcetree para Windows 3.4: actualice a una versión mayor o igual a la 3.4.20 Consulte las notas de la versión ([https://www.sourcetreeapp.com/download-archives]). Puede descargar la última versión de Sourcetree para Mac y Sourcetree para Windows desde el centro de descargas ([https://www.sourcetreeapp.com/download-archives]). Esta vulnerabilidad fue reportada a través de nuestro programa de pruebas de penetración."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV30":[{"source":"security@atlassian.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:sourcetree:3.4.19:*:*:*:*:windows:*:*","matchCriteriaId":"B839C817-5C4C-4A68-A443-7DB09B8C837B"},{"vulnerable":true,"criteria":"cpe:2.3:a:atlassian:sourcetree:4.2.8:*:*:*:*:macos:*:*","matchCriteriaId":"F04FBDBD-B558-4576-9D2D-3FE0860B4125"}]}]}],"references":[{"url":"https://confluence.atlassian.com/pages/viewpage.action?pageId=1456179091","source":"security@atlassian.com","tags":["Vendor Advisory"]},{"url":"https://jira.atlassian.com/browse/SRCTREE-8168","source":"security@atlassian.com","tags":["Vendor Advisory"]}]}}]}