-----BEGIN PGP SIGNED MESSAGE-----
Product: Hipchat Server.
Affected Hipchat Server product versions:
All versions < 2.2.3
Fixed Hipchat Server product versions:
This advisory discloses a critical severity security vulnerability
that was introduced in version 1.0 of Hipchat Server. Versions of
Hipchat Server starting with versions of Hipchat Server from 1.0 but
less than 2.2.3 (the fixed version), are affected by this
vulnerability. are affected by this vulnerability.
HipChat Cloud instances arent affected by the issue described in this email.
Customers who have upgraded Hipchat Server to version 2.2.3 are not affected.
Customers who have downloaded and installed any version less than
2.2.3 please upgrade your Hipchat Server installations immediately to
fix this vulnerability.
Remote Code Execution via Administrative Imports (CVE-2017-7357)
Atlassian rates the severity level of this vulnerability as critical,
according to the scale published in our Atlassian severity levels. The
scale allows us to rank the severity as critical, high, moderate or
This is an independent assessment and you should evaluate its
applicability to your own IT environment.
An attacker with Server Administrator level privileges could gain
Remote Code Execution via a malicious file importation.
All versions of Hipchat Server starting with versions of Hipchat
Server from 1.0 but less than 2.2.3 (the fixed version), are affected
by this vulnerability. are affected by this vulnerability. are
affected by this vulnerability. This issue can be tracked at:
To address this issue, weve released the following versions containing a fix:
* Hipchat Server version 2.2.3
Upgrade Hipchat Server to version 2.2.3 or higher.
The vulnerabilities and fix versions are described above. If affected,
you should upgrade to the latest version immediately.
For a full description of the latest version of Hipchat Server, see
the release notes found at
You can download the latest version of Hipchat Server from the
download centre found at https://www.hipchat.com/server/get-it.
If you have questions or concerns regarding this advisory, please
raise a support request at https://support.atlassian.com/.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----