Skip to main content

CVE-2023-22514: RCE (Remote Code Execution) in Atlassian Sourcetree for Mac

High
VulnerabilityCVE-2023-22514cvecve-2023-22514
Published: Tue Mar 18 2025 (03/18/2025, 17:03:59 UTC)
Source: CVE
Vendor/Project: Atlassian
Product: Sourcetree for Mac

Description

This High severity RCE (Remote Code Execution) vulnerability was introduced in version 3.4.14 of Sourcetree for Mac and Sourcetree for Windows. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.8, and a CVSS Vector of: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H which allows an unauthenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires user interaction. Atlassian recommends that Sourcetree for Mac and Sourcetree for Windows customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions: Sourcetree for Mac and Sourcetree for Windows 3.4: Upgrade to a release greater than or equal to 3.4.15 See the release notes (https://www.sourcetreeapp.com/download-archives). You can download the latest version of Sourcetree for Mac and Sourcetree for Windows from the download center (https://www.sourcetreeapp.com/download-archives). This vulnerability was reported via our Penetration Testing program.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:43:09 UTC

Technical Analysis

CVE-2023-22514 is a high-severity remote code execution (RCE) vulnerability affecting Atlassian Sourcetree for Mac and Windows, introduced in version 3.4.14. This vulnerability allows an unauthenticated attacker to execute arbitrary code on the victim's machine, potentially compromising confidentiality, integrity, and availability. The CVSS v3.0 score is 7.8, reflecting a high impact with the vector AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The vulnerability stems from improper handling of code execution inputs (CWE-94), which could allow malicious code injection. Atlassian has addressed this issue in versions 3.4.15 and later. The vulnerability was discovered through Atlassian's penetration testing program, and no known exploits are currently reported in the wild. Users are strongly advised to upgrade to the fixed versions to mitigate this risk. The vulnerability affects both Mac and Windows versions of Sourcetree, a popular Git GUI client used by developers for source code management.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for software development teams using Sourcetree as part of their development workflow. Successful exploitation could lead to arbitrary code execution on developer machines, potentially allowing attackers to steal sensitive source code, inject malicious code into repositories, or disrupt development processes. This could result in intellectual property theft, supply chain compromise, and operational downtime. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches, loss of trust, and compliance violations under regulations such as GDPR. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the risk in environments with less security awareness. Since Sourcetree is widely used in software development, the vulnerability could affect a broad range of sectors including finance, technology, manufacturing, and government agencies across Europe.

Mitigation Recommendations

European organizations should immediately verify their Sourcetree installations and upgrade to version 3.4.15 or later on both Mac and Windows platforms. If immediate upgrade is not feasible, restrict local access to machines running vulnerable versions and enforce strict endpoint security controls. Implement application whitelisting to prevent execution of unauthorized code. Educate users about the risk of interacting with untrusted content or links that could trigger the vulnerability. Employ network segmentation to isolate developer workstations from critical infrastructure. Regularly audit and monitor developer environments for unusual activity indicative of exploitation attempts. Additionally, integrate secure development practices such as code signing and repository access controls to limit the impact of any compromised developer machine. Organizations should also maintain updated backups of critical source code repositories to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
atlassian
Date Reserved
2023-01-01T00:01:22.330Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6bf3

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:43:09 PM

Last updated: 8/5/2025, 12:44:58 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats