Home Atlassian CVE-2024-21697
Back to Atlassian

CVE-2024-21697

Sourcetree

Atlassian CVSS 8.8 Updated March 15, 2026

Executive Risk Summary

"A high-severity Remote Code Execution (RCE) vulnerability exists in Sourcetree for Mac and Windows, allowing an unauthenticated attacker to execute arbitrary code with high impact to confidentiality, integrity, and availability. Users are recommended to upgrade to the latest version or a supported fixed version to mitigate this vulnerability."

Operational Audit Arsenal

Target Type Executable
Target Asset Sourcetree
Standard Path %PROGRAMFILES%\Atlassian\Sourcetree
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Sourcetree (Executable)
$Targets = 'Sourcetree'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Sourcetree service

Internal Work Notes

Apply latest Sourcetree update to prevent RCE vulnerability (CVE-2024-21697)

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Atlassian Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.