CVE-2015-8361
EUVD-2015-824508.02.2016, 19:59
Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not require authentication, which allows remote attackers to obtain sensitive information, modify settings, or manage build agents via unknown vectors involving the JMS port.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| atlassian | bamboo | 2.4 |
| atlassian | bamboo | 2.4.1 |
| atlassian | bamboo | 2.4.2 |
| atlassian | bamboo | 2.4.3 |
| atlassian | bamboo | 2.5 |
| atlassian | bamboo | 2.5.1 |
| atlassian | bamboo | 2.5.2 |
| atlassian | bamboo | 2.5.3 |
| atlassian | bamboo | 2.5.5 |
| atlassian | bamboo | 2.6 |
| atlassian | bamboo | 2.6.1 |
| atlassian | bamboo | 2.6.2 |
| atlassian | bamboo | 2.6.3 |
| atlassian | bamboo | 2.7 |
| atlassian | bamboo | 2.7.1 |
| atlassian | bamboo | 2.7.2 |
| atlassian | bamboo | 2.7.3 |
| atlassian | bamboo | 2.7.4 |
| atlassian | bamboo | 3.0 |
| atlassian | bamboo | 3.0.1 |
| atlassian | bamboo | 3.0.2 |
| atlassian | bamboo | 3.0.3 |
| atlassian | bamboo | 3.1 |
| atlassian | bamboo | 3.1.1 |
| atlassian | bamboo | 3.1.3 |
| atlassian | bamboo | 3.1.4 |
| atlassian | bamboo | 3.2 |
| atlassian | bamboo | 3.2.2 |
| atlassian | bamboo | 3.3 |
| atlassian | bamboo | 3.3.1 |
| atlassian | bamboo | 3.3.2 |
| atlassian | bamboo | 3.3.3 |
| atlassian | bamboo | 3.3.4 |
| atlassian | bamboo | 3.4 |
| atlassian | bamboo | 3.4.1 |
| atlassian | bamboo | 3.4.2 |
| atlassian | bamboo | 3.4.3 |
| atlassian | bamboo | 3.4.4 |
| atlassian | bamboo | 3.4.5 |
| atlassian | bamboo | 4.0 |
| atlassian | bamboo | 4.0.1 |
| atlassian | bamboo | 4.1 |
| atlassian | bamboo | 4.1.1 |
| atlassian | bamboo | 4.1.2 |
| atlassian | bamboo | 4.2 |
| atlassian | bamboo | 4.2.1 |
| atlassian | bamboo | 4.3 |
| atlassian | bamboo | 4.3.1 |
| atlassian | bamboo | 4.3.2 |
| atlassian | bamboo | 4.3.3 |
| atlassian | bamboo | 4.3.4 |
| atlassian | bamboo | 4.4 |
| atlassian | bamboo | 4.4.1 |
| atlassian | bamboo | 4.4.2 |
| atlassian | bamboo | 4.4.3 |
| atlassian | bamboo | 4.4.4 |
| atlassian | bamboo | 4.4.5 |
| atlassian | bamboo | 4.4.8 |
| atlassian | bamboo | 5.0 |
| atlassian | bamboo | 5.0:beta1 |
| atlassian | bamboo | 5.0:beta2 |
| atlassian | bamboo | 5.0:beta3 |
| atlassian | bamboo | 5.0:rc1 |
| atlassian | bamboo | 5.0.1 |
| atlassian | bamboo | 5.1 |
| atlassian | bamboo | 5.1.1 |
| atlassian | bamboo | 5.2 |
| atlassian | bamboo | 5.2.1 |
| atlassian | bamboo | 5.2.2 |
| atlassian | bamboo | 5.3 |
| atlassian | bamboo | 5.4 |
| atlassian | bamboo | 5.4.1 |
| atlassian | bamboo | 5.4.2 |
| atlassian | bamboo | 5.5 |
| atlassian | bamboo | 5.6 |
| atlassian | bamboo | 5.6.1 |
| atlassian | bamboo | 5.6.2 |
| atlassian | bamboo | 5.7 |
| atlassian | bamboo | 5.7.1 |
| atlassian | bamboo | 5.7.2 |
| atlassian | bamboo | 5.8 |
| atlassian | bamboo | 5.8.1 |
| atlassian | bamboo | 5.8.2 |
| atlassian | bamboo | 5.8.5 |
| atlassian | bamboo | 5.9 |
| atlassian | bamboo | 5.9.1 |
| atlassian | bamboo | 5.9.2 |
| atlassian | bamboo | 5.9.3 |
| atlassian | bamboo | 5.9.4 |
| atlassian | bamboo | 5.9.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References