Vulnerabilites related to atlassian - bitbucket
cve-2017-18087
Vulnerability from cvelistv5
Published
2018-02-15 13:00
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103038 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BSERV-10593 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: from 5.1.0 prior to 5.1.7 Version: from 5.2.0 prior to 5.2.5 Version: from 5.3.0 prior to 5.3.3 Version: from 5.4.0 prior to 5.4.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:48.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103038", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10593" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "from 5.1.0 prior to 5.1.7" }, { "status": "affected", "version": "from 5.2.0 prior to 5.2.5" }, { "status": "affected", "version": "from 5.3.0 prior to 5.3.3" }, { "status": "affected", "version": "from 5.4.0 prior to 5.4.1" } ] } ], "datePublic": "2018-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-16T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103038", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10593" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-02-15T00:00:00", "ID": "CVE-2017-18087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_value": "from 5.1.0 prior to 5.1.7" }, { "version_value": "from 5.2.0 prior to 5.2.5" }, { "version_value": "from 5.3.0 prior to 5.3.3" }, { "version_value": "from 5.4.0 prior to 5.4.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "103038", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103038" }, { "name": "https://jira.atlassian.com/browse/BSERV-10593", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10593" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18087", "datePublished": "2018-02-15T13:00:00Z", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-09-17T01:56:57.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36804
Vulnerability from cvelistv5
Published
2022-08-25 05:40
Modified
2024-09-16 18:14
Severity ?
EPSS score ?
Summary
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 7.0.0 < unspecified Version: unspecified < 7.6.17 Version: 7.7.0 < unspecified Version: unspecified < 7.17.10 Version: 7.18.0 < unspecified Version: unspecified < 7.21.4 Version: 8.0.0 < unspecified Version: unspecified < 8.0.3 Version: 8.1.0 < unspecified Version: unspecified < 8.1.3 Version: 8.2.0 < unspecified Version: unspecified < 8.2.2 Version: 8.3.0 < unspecified Version: unspecified < 8.3.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:14:28.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13438" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.6.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.17.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.21.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.0.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "lessThan": "8.3.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.6.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.17.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.21.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.0.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "lessThan": "8.3.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-08-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-24T00:00:00", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://jira.atlassian.com/browse/BSERV-13438" }, { "url": "http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html" }, { "url": "http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-36804", "datePublished": "2022-08-25T05:40:08.899310Z", "dateReserved": "2022-07-26T00:00:00", "dateUpdated": "2024-09-16T18:14:18.941Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26136
Vulnerability from cvelistv5
Published
2022-07-20 17:25
Modified
2024-10-03 16:43
Severity ?
EPSS score ?
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bamboo Server |
Version: unspecified < 8.0.9 Version: 8.1.0 < unspecified Version: unspecified < 8.1.8 Version: 8.2.0 < unspecified Version: unspecified < 8.2.4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26136", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:26:49.090400Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T16:43:16.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180).", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:18", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26136", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)." } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26136", "datePublished": "2022-07-20T17:25:18.803466Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T16:43:16.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18038
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-17 04:04
Severity ?
EPSS score ?
Summary
The repository settings resource in Atlassian Bitbucket Server before version 5.6.0 allows remote attackers to read the first line of arbitrary files via a path traversal vulnerability through the default branch name.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-10592 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: prior to 5.6.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 5.6.0" } ] } ], "datePublic": "2017-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The repository settings resource in Atlassian Bitbucket Server before version 5.6.0 allows remote attackers to read the first line of arbitrary files via a path traversal vulnerability through the default branch name." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10592" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-02-02T00:00:00", "ID": "CVE-2017-18038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_value": "prior to 5.6.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The repository settings resource in Atlassian Bitbucket Server before version 5.6.0 allows remote attackers to read the first line of arbitrary files via a path traversal vulnerability through the default branch name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-10592", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10592" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18038", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-17T04:04:47.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15005
Vulnerability from cvelistv5
Published
2019-11-08 03:55
Modified
2024-09-16 20:31
Severity ?
EPSS score ?
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-20647 | x_refsource_MISC | |
https://herolab.usd.de/security-advisories/usd-2019-0016/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: unspecified < 6.6.0 |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.3.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crowd", "vendor": "Atlassian", "versions": [ { "lessThan": "3.6.0", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.7.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T20:44:03", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "tags": [ "x_refsource_MISC" ], "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-11-08T00:00:00", "ID": "CVE-2019-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.6.0" } ] } }, { "product_name": "Jira Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.3.2" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.0.1" } ] } }, { "product_name": "Crowd", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "3.6.0" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.7.2" } ] } }, { "product_name": "Bamboo", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-20647", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "name": "https://herolab.usd.de/security-advisories/usd-2019-0016/", "refsource": "MISC", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15005", "datePublished": "2019-11-08T03:55:12.611106Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T20:31:42.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-4320
Vulnerability from cvelistv5
Published
2017-04-10 03:00
Modified
2024-08-06 00:25
Severity ?
EPSS score ?
Summary
Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-8819 | x_refsource_MISC | |
http://www.securityfocus.com/bid/97515 | vdb-entry, x_refsource_BID | |
https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Atlassian Bitbucket Server before 4.7.1 |
Version: Atlassian Bitbucket Server before 4.7.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:25:14.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-8819" }, { "name": "97515", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97515" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Atlassian Bitbucket Server before 4.7.1", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Atlassian Bitbucket Server before 4.7.1" } ] } ], "datePublic": "2017-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource." } ], "problemTypes": [ { "descriptions": [ { "description": "directory traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T22:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-8819" }, { "name": "97515", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97515" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-4320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Atlassian Bitbucket Server before 4.7.1", "version": { "version_data": [ { "version_value": "Atlassian Bitbucket Server before 4.7.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "directory traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-8819", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-8819" }, { "name": "97515", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97515" }, { "name": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-4320", "datePublished": "2017-04-10T03:00:00", "dateReserved": "2016-04-27T00:00:00", "dateUpdated": "2024-08-06T00:25:14.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15012
Vulnerability from cvelistv5
Published
2020-01-15 20:46
Modified
2024-09-17 04:24
Severity ?
EPSS score ?
Summary
Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12100 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 4.13 < unspecified Version: unspecified < 5.16.11 Version: 6.0 < unspecified Version: unspecified < 6.0.11 Version: 6.1.0 < unspecified Version: unspecified < 6.1.9 Version: 6.2.0 < unspecified Version: unspecified < 6.2.7 Version: 6.3.0 < unspecified Version: unspecified < 6.3.6 Version: 6.4.0 < unspecified Version: unspecified < 6.4.4 Version: 6.5.0 < unspecified Version: unspecified < 6.5.3 Version: 6.6.0 < unspecified Version: unspecified < 6.6.3 Version: 6.7.0 < unspecified Version: unspecified < 6.7.3 Version: 6.8.0 < unspecified Version: unspecified < 6.8.2 Version: 6.9.0 < unspecified Version: unspecified < 6.9.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12100" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "4.13", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "4.13", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-15T20:46:56", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12100" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-01-15T10:00:00", "ID": "CVE-2019-15012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "4.13" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "4.13" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12100", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12100" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15012", "datePublished": "2020-01-15T20:46:56.181070Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-17T04:24:12.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-20097
Vulnerability from cvelistv5
Published
2020-01-15 20:46
Modified
2024-09-16 18:48
Severity ?
EPSS score ?
Summary
Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim's Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12099 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 1.0 < unspecified Version: unspecified < 5.16.11 Version: 6.0 < unspecified Version: unspecified < 6.0.11 Version: 6.1.0 < unspecified Version: unspecified < 6.1.9 Version: 6.2.0 < unspecified Version: unspecified < 6.2.7 Version: 6.3.0 < unspecified Version: unspecified < 6.3.6 Version: 6.4.0 < unspecified Version: unspecified < 6.4.4 Version: 6.5.0 < unspecified Version: unspecified < 6.5.3 Version: 6.6.0 < unspecified Version: unspecified < 6.6.3 Version: 6.7.0 < unspecified Version: unspecified < 6.7.3 Version: 6.8.0 < unspecified Version: unspecified < 6.8.2 Version: 6.9.0 < unspecified Version: unspecified < 6.9.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:32:10.612Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12099" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "1.0", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "1.0", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-15T20:46:56", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12099" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-01-15T10:00:00", "ID": "CVE-2019-20097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "1.0" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "1.0" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12099", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12099" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-20097", "datePublished": "2020-01-15T20:46:56.225730Z", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-09-16T18:48:48.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-5225
Vulnerability from cvelistv5
Published
2018-03-22 13:00
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-10684 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103488 | vdb-entry, x_refsource_BID | |
https://confluence.atlassian.com/x/3WNsO | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 4.13.0 < unspecified Version: unspecified < 5.4.8 Version: 5.5.0 < unspecified Version: unspecified < 5.5.8 Version: 5.6.0 < unspecified Version: unspecified < 5.6.5 Version: 5.7.0 < unspecified Version: unspecified < 5.7.3 Version: 5.8.0 < unspecified Version: unspecified < 5.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:33:42.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10684" }, { "name": "103488", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103488" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://confluence.atlassian.com/x/3WNsO" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "4.13.0", "versionType": "custom" }, { "lessThan": "5.4.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.5.0", "versionType": "custom" }, { "lessThan": "5.5.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.6.0", "versionType": "custom" }, { "lessThan": "5.6.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.7.0", "versionType": "custom" }, { "lessThan": "5.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.8.0", "versionType": "custom" }, { "lessThan": "5.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2018-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-26T20:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10684" }, { "name": "103488", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103488" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://confluence.atlassian.com/x/3WNsO" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2018-03-22T10:00:00", "ID": "CVE-2018-5225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "4.13.0" }, { "version_affected": "\u003c", "version_value": "5.4.8" }, { "version_affected": "\u003e=", "version_value": "5.5.0" }, { "version_affected": "\u003c", "version_value": "5.5.8" }, { "version_affected": "\u003e=", "version_value": "5.6.0" }, { "version_affected": "\u003c", "version_value": "5.6.5" }, { "version_affected": "\u003e=", "version_value": "5.7.0" }, { "version_affected": "\u003c", "version_value": "5.7.3" }, { "version_affected": "\u003e=", "version_value": "5.8.0" }, { "version_affected": "\u003c", "version_value": "5.8.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-10684", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10684" }, { "name": "103488", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103488" }, { "name": "https://confluence.atlassian.com/x/3WNsO", "refsource": "CONFIRM", "url": "https://confluence.atlassian.com/x/3WNsO" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2018-5225", "datePublished": "2018-03-22T13:00:00Z", "dateReserved": "2018-01-05T00:00:00", "dateUpdated": "2024-09-16T18:49:04.214Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15000
Vulnerability from cvelistv5
Published
2019-09-19 14:24
Modified
2024-09-17 01:41
Severity ?
EPSS score ?
Summary
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-11947 | x_refsource_MISC | |
https://seclists.org/bugtraq/2019/Sep/43 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: unspecified < 5.16.10 Version: 6.0.0 < unspecified Version: unspecified < 6.0.10 Version: 6.1.0 < unspecified Version: unspecified < 6.1.8 Version: 6.2.0 < unspecified Version: unspecified < 6.2.6 Version: 6.3.0 < unspecified Version: unspecified < 6.3.5 Version: 6.4.0 < unspecified Version: unspecified < 6.4.3 Version: 6.5.0 < unspecified Version: unspecified < 6.5.2 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:52.974Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-11947" }, { "name": "20190925 Bitbucket Server security advisory 2019-09-18", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/43" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "5.16.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.0.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "5.16.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.0.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-25T19:06:12", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-11947" }, { "name": "20190925 Bitbucket Server security advisory 2019-09-18", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/43" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-09-18T00:00:00", "ID": "CVE-2019-15000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.16.10" }, { "version_affected": "\u003e=", "version_value": "6.0.0" }, { "version_affected": "\u003c", "version_value": "6.0.10" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.8" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.6" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.5" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.3" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.2" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "5.16.10" }, { "version_affected": "\u003e=", "version_value": "6.0.0" }, { "version_affected": "\u003c", "version_value": "6.0.10" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.8" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.6" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.5" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.3" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-11947", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-11947" }, { "name": "20190925 Bitbucket Server security advisory 2019-09-18", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/43" }, { "name": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15000", "datePublished": "2019-09-19T14:24:38.322739Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-17T01:41:56.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3397
Vulnerability from cvelistv5
Published
2019-06-03 13:44
Modified
2024-09-16 17:47
Severity ?
EPSS score ?
Summary
Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-11706 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Data Center |
Version: 5.13.0 < unspecified Version: unspecified < 5.13.6 Version: 5.14.0 < unspecified Version: unspecified < 5.14.4 Version: 5.15.0 < unspecified Version: unspecified < 5.15.3 Version: 6.0.0 < unspecified Version: unspecified < 6.0.3 Version: 6.1.0 < unspecified Version: unspecified < 6.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-11706" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.13.0", "versionType": "custom" }, { "lessThan": "5.13.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.14.0", "versionType": "custom" }, { "lessThan": "5.14.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "5.15.0", "versionType": "custom" }, { "lessThan": "5.15.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThan": "6.0.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-03T13:44:05", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-11706" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2019-05-22T10:00:00", "ID": "CVE-2019-3397", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "5.13.0" }, { "version_affected": "\u003c", "version_value": "5.13.6" }, { "version_affected": "\u003e=", "version_value": "5.14.0" }, { "version_affected": "\u003c", "version_value": "5.14.4" }, { "version_affected": "\u003e=", "version_value": "5.15.0" }, { "version_affected": "\u003c", "version_value": "5.15.3" }, { "version_affected": "\u003e=", "version_value": "6.0.0" }, { "version_affected": "\u003c", "version_value": "6.0.3" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.2" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-11706", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-11706" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-3397", "datePublished": "2019-06-03T13:44:05.862975Z", "dateReserved": "2018-12-19T00:00:00", "dateUpdated": "2024-09-16T17:47:59.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14171
Vulnerability from cvelistv5
Published
2020-07-09 17:17
Modified
2024-09-17 02:01
Severity ?
EPSS score ?
Summary
Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12434 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 4.9.0 < unspecified Version: unspecified < 7.2.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12434" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "4.9.0", "versionType": "custom" }, { "lessThan": "7.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-Middle (MITM)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-09T17:17:29", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12434" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-07-09T00:00:00", "ID": "CVE-2020-14171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "4.9.0" }, { "version_affected": "\u003c", "version_value": "7.2.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-Middle (MITM)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12434", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12434" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-14171", "datePublished": "2020-07-09T17:17:29.210940Z", "dateReserved": "2020-06-16T00:00:00", "dateUpdated": "2024-09-17T02:01:36.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-15010
Vulnerability from cvelistv5
Published
2020-01-15 20:46
Modified
2024-09-16 22:56
Severity ?
EPSS score ?
Summary
Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, and from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via certain user input fields. A remote attacker with user level permissions can exploit this vulnerability to run arbitrary commands on the victim's systems. Using a specially crafted payload as user input, the attacker can execute arbitrary commands on the victim's Bitbucket Server or Bitbucket Data Center instance.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12098 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 3.0 < unspecified Version: unspecified < 5.16.11 Version: 6.0 < unspecified Version: unspecified < 6.0.11 Version: 6.1.0 < unspecified Version: unspecified < 6.1.9 Version: 6.2.0 < unspecified Version: unspecified < 6.2.7 Version: 6.3.0 < unspecified Version: unspecified < 6.3.6 Version: 6.4.0 < unspecified Version: unspecified < 6.4.4 Version: 6.5.0 < unspecified Version: unspecified < 6.5.3 Version: 6.6.0 < unspecified Version: unspecified < 6.6.3 Version: 6.7.0 < unspecified Version: unspecified < 6.7.3 Version: 6.8.0 < unspecified Version: unspecified < 6.8.2 Version: 6.9.0 < unspecified Version: unspecified < 6.9.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:34:53.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12098" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "3.0", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "3.0", "versionType": "custom" }, { "lessThan": "5.16.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.0", "versionType": "custom" }, { "lessThan": "6.0.11", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "lessThan": "6.1.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "lessThan": "6.2.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.3.0", "versionType": "custom" }, { "lessThan": "6.3.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThan": "6.4.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.5.0", "versionType": "custom" }, { "lessThan": "6.5.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.6.0", "versionType": "custom" }, { "lessThan": "6.6.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.7.0", "versionType": "custom" }, { "lessThan": "6.7.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.8.0", "versionType": "custom" }, { "lessThan": "6.8.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "6.9.0", "versionType": "custom" }, { "lessThan": "6.9.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-01-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, and from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via certain user input fields. A remote attacker with user level permissions can exploit this vulnerability to run arbitrary commands on the victim\u0027s systems. Using a specially crafted payload as user input, the attacker can execute arbitrary commands on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance." } ], "problemTypes": [ { "descriptions": [ { "description": "Expression Language Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-15T20:46:56", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12098" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-01-15T10:00:00", "ID": "CVE-2019-15010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "3.0" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "3.0" }, { "version_affected": "\u003c", "version_value": "5.16.11" }, { "version_affected": "\u003e=", "version_value": "6.0" }, { "version_affected": "\u003c", "version_value": "6.0.11" }, { "version_affected": "\u003e=", "version_value": "6.1.0" }, { "version_affected": "\u003c", "version_value": "6.1.9" }, { "version_affected": "\u003e=", "version_value": "6.2.0" }, { "version_affected": "\u003c", "version_value": "6.2.7" }, { "version_affected": "\u003e=", "version_value": "6.3.0" }, { "version_affected": "\u003c", "version_value": "6.3.6" }, { "version_affected": "\u003e=", "version_value": "6.4.0" }, { "version_affected": "\u003c", "version_value": "6.4.4" }, { "version_affected": "\u003e=", "version_value": "6.5.0" }, { "version_affected": "\u003c", "version_value": "6.5.3" }, { "version_affected": "\u003e=", "version_value": "6.6.0" }, { "version_affected": "\u003c", "version_value": "6.6.3" }, { "version_affected": "\u003e=", "version_value": "6.7.0" }, { "version_affected": "\u003c", "version_value": "6.7.3" }, { "version_affected": "\u003e=", "version_value": "6.8.0" }, { "version_affected": "\u003c", "version_value": "6.8.2" }, { "version_affected": "\u003e=", "version_value": "6.9.0" }, { "version_affected": "\u003c", "version_value": "6.9.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, and from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via certain user input fields. A remote attacker with user level permissions can exploit this vulnerability to run arbitrary commands on the victim\u0027s systems. Using a specially crafted payload as user input, the attacker can execute arbitrary commands on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Expression Language Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12098", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12098" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2019-15010", "datePublished": "2020-01-15T20:46:56.108707Z", "dateReserved": "2019-08-13T00:00:00", "dateUpdated": "2024-09-16T22:56:09.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18037
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 20:27
Severity ?
EPSS score ?
Summary
The git repository tag rest resource in Atlassian Bitbucket Server from version 3.7.0 before 4.14.11 (the fixed version for 4.14.x), from version 5.0.0 before 5.0.9 (the fixed version for 5.0.x), from version 5.1.0 before 5.1.8 (the fixed version for 5.1.x), from version 5.2.0 before 5.2.6 (the fixed version for 5.2.x), from version 5.3.0 before 5.3.4 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.2 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.1 (the fixed version for 5.5.x) and before 5.6.0 allows remote attackers to read arbitrary files via a path traversal vulnerability through the name of a git tag.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-10595 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: from 3.7.0 prior to 4.14.11 Version: from 5.0.0 prior to 5.0.9 Version: from 5.1.0 prior to 5.1.8 Version: from 5.2.0 prior to 5.2.6 Version: from 5.3.0 prior to 5.3.4 Version: from 5.4.0 prior to 5.4.2 Version: from 5.5.0 prior to 5.5.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10595" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "from 3.7.0 prior to 4.14.11" }, { "status": "affected", "version": "from 5.0.0 prior to 5.0.9" }, { "status": "affected", "version": "from 5.1.0 prior to 5.1.8" }, { "status": "affected", "version": "from 5.2.0 prior to 5.2.6" }, { "status": "affected", "version": "from 5.3.0 prior to 5.3.4" }, { "status": "affected", "version": "from 5.4.0 prior to 5.4.2" }, { "status": "affected", "version": "from 5.5.0 prior to 5.5.1" } ] } ], "datePublic": "2017-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The git repository tag rest resource in Atlassian Bitbucket Server from version 3.7.0 before 4.14.11 (the fixed version for 4.14.x), from version 5.0.0 before 5.0.9 (the fixed version for 5.0.x), from version 5.1.0 before 5.1.8 (the fixed version for 5.1.x), from version 5.2.0 before 5.2.6 (the fixed version for 5.2.x), from version 5.3.0 before 5.3.4 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.2 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.1 (the fixed version for 5.5.x) and before 5.6.0 allows remote attackers to read arbitrary files via a path traversal vulnerability through the name of a git tag." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T13:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10595" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-02-02T00:00:00", "ID": "CVE-2017-18037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_value": "from 3.7.0 prior to 4.14.11" }, { "version_value": "from 5.0.0 prior to 5.0.9" }, { "version_value": "from 5.1.0 prior to 5.1.8" }, { "version_value": "from 5.2.0 prior to 5.2.6" }, { "version_value": "from 5.3.0 prior to 5.3.4" }, { "version_value": "from 5.4.0 prior to 5.4.2" }, { "version_value": "from 5.5.0 prior to 5.5.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The git repository tag rest resource in Atlassian Bitbucket Server from version 3.7.0 before 4.14.11 (the fixed version for 4.14.x), from version 5.0.0 before 5.0.9 (the fixed version for 5.0.x), from version 5.1.0 before 5.1.8 (the fixed version for 5.1.x), from version 5.2.0 before 5.2.6 (the fixed version for 5.2.x), from version 5.3.0 before 5.3.4 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.2 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.1 (the fixed version for 5.5.x) and before 5.6.0 allows remote attackers to read arbitrary files via a path traversal vulnerability through the name of a git tag." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-10595", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10595" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18037", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T20:27:24.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18036
Vulnerability from cvelistv5
Published
2018-02-02 14:00
Modified
2024-09-16 19:04
Severity ?
EPSS score ?
Summary
The Github repository importer in Atlassian Bitbucket Server before version 5.3.0 allows remote attackers to determine if a service they could not otherwise reach has open ports via a Server Side Request Forgery (SSRF) vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-10591 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102932 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: prior to 5.3.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10591" }, { "name": "102932", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102932" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "prior to 5.3.0" } ] } ], "datePublic": "2017-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The Github repository importer in Atlassian Bitbucket Server before version 5.3.0 allows remote attackers to determine if a service they could not otherwise reach has open ports via a Server Side Request Forgery (SSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "Server Side Request Forgery (CWE-918)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-07T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10591" }, { "name": "102932", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102932" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2017-02-02T00:00:00", "ID": "CVE-2017-18036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_value": "prior to 5.3.0" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Github repository importer in Atlassian Bitbucket Server before version 5.3.0 allows remote attackers to determine if a service they could not otherwise reach has open ports via a Server Side Request Forgery (SSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Server Side Request Forgery (CWE-918)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-10591", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10591" }, { "name": "102932", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102932" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18036", "datePublished": "2018-02-02T14:00:00Z", "dateReserved": "2018-01-17T00:00:00", "dateUpdated": "2024-09-16T19:04:43.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-43781
Vulnerability from cvelistv5
Published
2022-11-17 00:00
Modified
2024-10-02 14:56
Severity ?
EPSS score ?
Summary
There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Data Center |
Version: before 7.17.12 Version: before 7.21.6 Version: before 7.6.19 Version: before 8.0.5 Version: before 8.1.5 Version: before 8.2.4 Version: before 8.3.3 Version: before 8.4.2 Version: before 8.5.0 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:40:06.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://confluence.atlassian.com/x/Y4hXRg" }, { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13522" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.19", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.17.12", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.21.6", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "8.0.5", "status": "affected", "version": "7.22.0", "versionType": "custom" }, { "lessThan": "8.1.5", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.3.3", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "lessThan": "8.4.2", "status": "affected", "version": "8.4.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-43781", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T14:27:57.305026Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T14:56:09.693Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "before 7.0" }, { "status": "affected", "version": "before 7.17.12" }, { "status": "affected", "version": "before 7.21.6" }, { "status": "affected", "version": "before 7.6.19" }, { "status": "affected", "version": "before 8.0.5" }, { "status": "affected", "version": "before 8.1.5" }, { "status": "affected", "version": "before 8.2.4" }, { "status": "affected", "version": "before 8.3.3" }, { "status": "affected", "version": "before 8.4.2" }, { "status": "affected", "version": "before 8.5.0" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "status": "unaffected", "version": "before 7.0" }, { "status": "affected", "version": "before 7.17.12" }, { "status": "affected", "version": "before 7.21.6" }, { "status": "affected", "version": "before 7.6.19" }, { "status": "affected", "version": "before 8.0.5" }, { "status": "affected", "version": "before 8.1.5" }, { "status": "affected", "version": "before 8.2.4" }, { "status": "affected", "version": "before 8.3.3" }, { "status": "affected", "version": "before 8.4.2" }, { "status": "affected", "version": "before 8.5.0" } ] } ], "credits": [ { "lang": "en", "value": "https://github.com/Ry0taK" } ], "descriptions": [ { "lang": "en", "value": "There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled \u201cAllow public signup\u201d." } ], "problemTypes": [ { "descriptions": [ { "description": "RCE (Remote Code Execution)", "lang": "en", "type": "RCE (Remote Code Execution)" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-17T00:00:01.210Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://confluence.atlassian.com/x/Y4hXRg" }, { "url": "https://jira.atlassian.com/browse/BSERV-13522" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-43781", "datePublished": "2022-11-17T00:00:01.210Z", "dateReserved": "2022-10-26T14:49:11.114Z", "dateUpdated": "2024-10-02T14:56:09.693Z", "requesterUserId": "4ceb4895-2afc-4c29-bf72-c2e04b367c52", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26137
Vulnerability from cvelistv5
Published
2022-07-20 17:25
Modified
2024-10-03 17:10
Severity ?
EPSS score ?
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BAM-21795 | x_refsource_MISC | |
https://jira.atlassian.com/browse/BSERV-13370 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CONFSERVER-79476 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CWD-5815 | x_refsource_MISC | |
https://jira.atlassian.com/browse/FE-7410 | x_refsource_MISC | |
https://jira.atlassian.com/browse/CRUC-8541 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JRASERVER-73897 | x_refsource_MISC | |
https://jira.atlassian.com/browse/JSDSERVER-11863 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Atlassian | Bamboo Server |
Version: unspecified < 8.0.9 Version: 8.1.0 < unspecified Version: unspecified < 8.1.8 Version: 8.2.0 < unspecified Version: unspecified < 8.2.4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bamboo", "vendor": "atlassian", "versions": [ { "lessThan": "7.2.10", "status": "affected", "version": "7.2.0", "versionType": "custom" }, { "lessThan": "8.0.9", "status": "affected", "version": "8.0.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "8.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "7.20.1", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "7.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "bitbucket", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_data_center", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "7.17.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "confluence_server", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "7.18.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "4.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crowd", "vendor": "atlassian", "versions": [ { "status": "affected", "version": "5.0.0" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "crucible", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fisheye", "vendor": "atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_data_center", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "jira_server", "vendor": "atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "8.13.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "8.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_desk:-:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_desk", "vendor": "atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*" ], "defaultStatus": "unknown", "product": "jira_service_management", "vendor": "atlassian", "versions": [ { "lessThan": "4.20.10", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "4.21.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-26137", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T16:48:52.174175Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T17:10:16.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Bamboo Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bamboo Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.0.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "lessThan": "8.1.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "lessThan": "8.2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.6.16", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.17.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.19.5", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.20.0", "versionType": "custom" }, { "lessThan": "7.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.21.0", "versionType": "custom" }, { "lessThan": "7.21.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "8.1.0" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.5.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "7.18.0" } ] }, { "product": "Crowd Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crowd Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.3.8", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.4.0", "versionType": "custom" }, { "lessThan": "4.4.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "affected", "version": "5.0.0" } ] }, { "product": "Crucible", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Fisheye", "vendor": "Atlassian", "versions": [ { "lessThan": "4.8.10", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Core Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Server", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Software Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "8.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.14.0", "versionType": "custom" }, { "lessThan": "8.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "8.21.0", "versionType": "custom" }, { "lessThan": "8.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Server", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Jira Service Management Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "4.13.22", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.14.0", "versionType": "custom" }, { "lessThan": "4.20.10", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "4.21.0", "versionType": "custom" }, { "lessThan": "4.22.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-180", "description": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-20T17:25:23", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-07-20T00:00:00", "ID": "CVE-2022-26137", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bamboo Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bamboo Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.0.9" }, { "version_affected": "\u003e=", "version_value": "8.1.0" }, { "version_affected": "\u003c", "version_value": "8.1.8" }, { "version_affected": "\u003e=", "version_value": "8.2.0" }, { "version_affected": "\u003c", "version_value": "8.2.4" } ] } }, { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.6.16" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.17.8" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.19.5" }, { "version_affected": "\u003e=", "version_value": "7.20.0" }, { "version_affected": "\u003c", "version_value": "7.20.2" }, { "version_affected": "\u003e=", "version_value": "7.21.0" }, { "version_affected": "\u003c", "version_value": "7.21.2" }, { "version_affected": "=", "version_value": "8.0.0" }, { "version_affected": "=", "version_value": "8.1.0" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.5.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "=", "version_value": "7.18.0" } ] } }, { "product_name": "Crowd Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crowd Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.3.8" }, { "version_affected": "\u003e=", "version_value": "4.4.0" }, { "version_affected": "\u003c", "version_value": "4.4.2" }, { "version_affected": "=", "version_value": "5.0.0" } ] } }, { "product_name": "Crucible", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Fisheye", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.8.10" } ] } }, { "product_name": "Jira Core Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Software Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.13.22" }, { "version_affected": "\u003e=", "version_value": "8.14.0" }, { "version_affected": "\u003c", "version_value": "8.20.10" }, { "version_affected": "\u003e=", "version_value": "8.21.0" }, { "version_affected": "\u003c", "version_value": "8.22.4" } ] } }, { "product_name": "Jira Service Management Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } }, { "product_name": "Jira Service Management Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.13.22" }, { "version_affected": "\u003e=", "version_value": "4.14.0" }, { "version_affected": "\u003c", "version_value": "4.20.10" }, { "version_affected": "\u003e=", "version_value": "4.21.0" }, { "version_affected": "\u003c", "version_value": "4.22.4" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Behavior Order: Validate Before Canonicalize (CWE-180)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BAM-21795", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "name": "https://jira.atlassian.com/browse/BSERV-13370", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "name": "https://jira.atlassian.com/browse/CONFSERVER-79476", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "name": "https://jira.atlassian.com/browse/CWD-5815", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "name": "https://jira.atlassian.com/browse/FE-7410", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/FE-7410" }, { "name": "https://jira.atlassian.com/browse/CRUC-8541", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "name": "https://jira.atlassian.com/browse/JRASERVER-73897", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "name": "https://jira.atlassian.com/browse/JSDSERVER-11863", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26137", "datePublished": "2022-07-20T17:25:23.603830Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-10-03T17:10:16.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-18088
Vulnerability from cvelistv5
Published
2018-02-15 13:00
Modified
2024-08-05 21:13
Severity ?
EPSS score ?
Summary
Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103040 | vdb-entry, x_refsource_BID | |
https://jira.atlassian.com/browse/BSERV-10594 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:13:47.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "103040", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-10594" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-16T10:57:01", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "name": "103040", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://jira.atlassian.com/browse/BSERV-10594" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "ID": "CVE-2017-18088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "103040", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103040" }, { "name": "https://jira.atlassian.com/browse/BSERV-10594", "refsource": "CONFIRM", "url": "https://jira.atlassian.com/browse/BSERV-10594" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2017-18088", "datePublished": "2018-02-15T13:00:00", "dateReserved": "2018-02-01T00:00:00", "dateUpdated": "2024-08-05T21:13:47.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14170
Vulnerability from cvelistv5
Published
2020-07-09 17:20
Modified
2024-09-17 04:09
Severity ?
EPSS score ?
Summary
Webhooks in Atlassian Bitbucket Server from version 5.4.0 before version 7.3.1 allow remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12433 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: 5.4.0 < unspecified Version: unspecified < 7.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12433" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.4.0", "versionType": "custom" }, { "lessThan": "7.3.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2020-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Webhooks in Atlassian Bitbucket Server from version 5.4.0 before version 7.3.1 allow remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Server Side Request Forgery (SSRF)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-09T17:20:48", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12433" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2020-07-09T00:00:00", "ID": "CVE-2020-14170", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "5.4.0" }, { "version_affected": "\u003c", "version_value": "7.3.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Webhooks in Atlassian Bitbucket Server from version 5.4.0 before version 7.3.1 allow remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Server Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12433", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12433" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-14170", "datePublished": "2020-07-09T17:20:48.079852Z", "dateReserved": "2020-06-16T00:00:00", "dateUpdated": "2024-09-17T04:09:37.826Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36233
Vulnerability from cvelistv5
Published
2021-02-18 15:16
Modified
2024-09-16 19:30
Severity ?
EPSS score ?
Summary
The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
References
▼ | URL | Tags |
---|---|---|
https://jira.atlassian.com/browse/BSERV-12753 | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/240785 | third-party-advisory, x_refsource_CERT-VN |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Atlassian | Bitbucket Server |
Version: unspecified < 6.10.9 Version: 7.0.0 < unspecified Version: unspecified < 7.6.4 Version: 7.7.0 < unspecified Version: unspecified < 7.10.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:23:09.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-12753" }, { "name": "VU#240785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/240785" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Server", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.10.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "6.10.9", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "lessThan": "7.6.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.7.0", "versionType": "custom" }, { "lessThan": "7.10.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-18T19:06:08", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/BSERV-12753" }, { "name": "VU#240785", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/240785" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2021-02-16T00:00:00", "ID": "CVE-2020-36233", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Bitbucket Server", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.9" }, { "version_affected": "\u003e=", "version_value": "7.0.0" }, { "version_affected": "\u003c", "version_value": "7.6.4" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003c", "version_value": "7.10.1" } ] } }, { "product_name": "Bitbucket Data Center", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.10.9" }, { "version_affected": "\u003e=", "version_value": "7.0.0" }, { "version_affected": "\u003c", "version_value": "7.6.4" }, { "version_affected": "\u003e=", "version_value": "7.7.0" }, { "version_affected": "\u003c", "version_value": "7.10.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/BSERV-12753", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/BSERV-12753" }, { "name": "VU#240785", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/240785" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2020-36233", "datePublished": "2021-02-18T15:16:22.101146Z", "dateReserved": "2021-01-27T00:00:00", "dateUpdated": "2024-09-16T19:30:12.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-07-20 18:15
Modified
2024-11-21 06:53
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "218C960A-04C6-4242-BEBA-C81CF5F1F722", "versionEndExcluding": "7.2.10", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "E360CDE0-FD1E-4337-8268-DB89CF605EE0", "versionEndExcluding": "8.0.9", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0913EE0-2046-4E7E-966D-DC894E34D12B", "versionEndExcluding": "8.1.8", "versionStartIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "D182C1B1-A5FF-4777-9835-4E9114BB68DC", "versionEndExcluding": "8.2.4", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCD53E4-3169-4E8A-88D1-38BE51D09DD3", "versionEndExcluding": "7.6.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B878E40-95A7-40A7-9C52-6BC0C2FD3F54", "versionEndExcluding": "7.17.8", "versionStartIncluding": "7.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "46305D5A-7F7B-4A04-9DAD-E582D1193A7E", "versionEndExcluding": "7.19.5", "versionStartIncluding": "7.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96B135B-9272-457E-A557-6566554262D3", "versionEndExcluding": "7.20.2", "versionStartIncluding": "7.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "62956861-BEDE-40C8-B628-C831087E7BDB", "versionEndExcluding": "7.21.2", "versionStartIncluding": "7.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A85565F-3F80-4E00-A706-AB4B2EAA4AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99E2E3C0-CDF0-4D79-80A6-85E71B947ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C543CA6-8E8A-476C-AB27-614DF4EC68A5", "versionEndExcluding": "7.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FD913B-45DE-4CA8-9733-D62F54B19E74", "versionEndExcluding": "7.13.7", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "12E753EB-0D31-448B-B8DE-0A95434CC97C", "versionEndExcluding": "7.14.3", "versionStartIncluding": "7.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE114494-74F0-454C-AAC4-8B8E5F1C67D0", "versionEndExcluding": "7.15.2", "versionStartIncluding": "7.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "90BB3572-29ED-415F-AD34-00EB76271F9C", "versionEndExcluding": "7.16.4", "versionStartIncluding": "7.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "30EF756A-B4E9-4E5D-BE6F-02CE95F12C9C", "versionEndExcluding": "7.17.4", "versionStartIncluding": "7.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "A56B6A10-E23F-49EF-8C07-1AEDFCAE2788", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE8BE634-1599-4790-9410-6CA43BC60C4D", "versionEndExcluding": "7.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52E68DFD-48F5-4949-AFEA-3829CA5DFC04", "versionEndExcluding": "7.13.7", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDEC6C-4515-4CAA-9D82-7BF68A3AAE7E", "versionEndExcluding": "7.14.3", "versionStartIncluding": "7.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9948F94-DF67-4E3C-8CD4-417D57FBC60F", "versionEndExcluding": "7.15.2", "versionStartIncluding": "7.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E63ECB-85A8-4D41-A9B5-9FFF18D9CDB1", "versionEndExcluding": "7.16.4", "versionStartIncluding": "7.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "694171BD-FAE2-472C-8183-04BCA2F7B9A7", "versionEndExcluding": "7.17.4", "versionStartIncluding": "7.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AC5E81B-DA4B-45E7-9584-4B576E49FD8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE028964-B3FC-4883-9967-68DE46EE7F6F", "versionEndExcluding": "4.3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "57DC9E2A-4C89-420D-9330-F11E56BF2F83", "versionEndExcluding": "4.4.2", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C50A718F-C67B-4462-BB7E-F80408DEF07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "matchCriteriaId": "92329A2E-13E8-4818-85AB-3E7F479411EF", "versionEndExcluding": "4.8.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "matchCriteriaId": "30DDE751-CA88-4CFB-9E60-4243851B4B53", "versionEndExcluding": "4.8.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "D91B8507-A7A7-4B74-9999-F1DEA9F487A9", "versionEndExcluding": "8.13.22", "versionStartIncluding": "8.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "963AE427-2897-42CB-AE11-654D700E690B", "versionEndExcluding": "8.20.10", "versionStartIncluding": "8.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7CD8891-BB97-4AD3-BEE4-6CCA0D8A2D85", "versionEndExcluding": "8.22.4", "versionStartIncluding": "8.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E73A5202-6114-48E6-8F9B-C03B2E707055", "versionEndExcluding": "8.13.22", "versionStartIncluding": "8.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D22AB11D-1D73-45DC-803C-146EFED18CDA", "versionEndExcluding": "8.20.10", "versionStartIncluding": "8.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB2091E9-0B14-4786-852F-454C56D20839", "versionEndExcluding": "8.22.4", "versionStartIncluding": "8.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "1451C219-8AAA-4165-AE2C-033EF7B6F93A", "versionEndExcluding": "4.13.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*", "matchCriteriaId": "BD23F987-0F14-4938-BB51-4EE61C24EB62", "versionEndExcluding": "4.13.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "39F77953-41D7-4398-9F07-2A057A993762", "versionEndExcluding": "4.20.10", "versionStartIncluding": "4.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "matchCriteriaId": "CADBE0E7-36D9-4F6F-BEE6-A1E0B9428C2A", "versionEndExcluding": "4.20.10", "versionStartIncluding": "4.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "DC0DB08B-2034-4691-A7B2-3E5F8B6318B1", "versionEndExcluding": "4.22.4", "versionStartIncluding": "4.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "matchCriteriaId": "97A17BE7-7CCC-46D8-A317-53E2B026DF6E", "versionEndExcluding": "4.22.4", "versionStartIncluding": "4.21.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim\u2019s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." }, { "lang": "es", "value": "Una vulnerabilidad en diversos productos de Atlassian permite a un atacante remoto no autenticado causar que sean invocados Filtros Servlet adicionales cuando la aplicaci\u00f3n procesa peticiones o respuestas. Atlassian ha confirmado y corregido el \u00fanico problema de seguridad conocido asociado a esta vulnerabilidad: Omisi\u00f3n de recursos de origen cruzado (CORS). El env\u00edo de una petici\u00f3n HTTP especialmente dise\u00f1ada puede invocar el filtro Servlet usado para responder a las peticiones CORS, resultando en una omisi\u00f3n de CORS. Un atacante que pueda enga\u00f1ar a un usuario para que solicite una URL maliciosa puede acceder a la aplicaci\u00f3n vulnerable con los permisos de la v\u00edctima. Est\u00e1n afectadas las versiones de Atlassian Bamboo anteriores a 8.0.9, desde la 8.1.0 anteriores a 8.1.8 y de la 8.2.0 anteriores a 8.2.4. Las versiones de Atlassian Bitbucket est\u00e1n afectadas anteriores a 7.6.16, desde la 7.7.0 anteriores a 7.17.8, desde la 7.18.0 anteriores a 7.19.5, desde la 7.20.0 anteriores a 7.20.2, desde la 7.21.0 anteriores a 7.21.2, y las versiones 8.0.0 y 8.1.0. Est\u00e1n afectadas las versiones de Atlassian Confluence anteriores a 7.4.17, desde la 7.5.0 anteriores a 7.13.7, desde la 7.14.0 anteriores a 7.14.3, desde la 7.15.0 anteriores a 7.15.2, desde la 7.16.0 anteriores a 7.16.4, desde la 7.17.0 anteriores a 7.17.4 y la versi\u00f3n 7.21.0. Est\u00e1n afectadas las versiones de Atlassian Crowd anteriores a 4.3.8, desde la 4.4.0 hasta 4.4.2, y la versi\u00f3n 5.0.0. Est\u00e1n afectadas las versiones de Atlassian Fisheye y Crucible anteriores a 4.8.10. Est\u00e1n afectadas las versiones de Atlassian Jira anteriores a 8.13.22, desde la 8.14.0 hasta 8.20.10, y desde la 8.21.0 hasta 8.22.4. Las versiones de Atlassian Jira Service Management est\u00e1n afectadas anteriores a 4.13.22, desde la 4.14.0 anteriores a 4.20.10, y desde la 4.21.0 anteriores a 4.22.4" } ], "id": "CVE-2022-26137", "lastModified": "2024-11-21T06:53:30.583", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-07-20T18:15:08.557", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-180" } ], "source": "security@atlassian.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-22 13:29
Modified
2024-11-21 04:08
Severity ?
Summary
In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/103488 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://confluence.atlassian.com/x/3WNsO | Vendor Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10684 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103488 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/x/3WNsO | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10684 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBD82B36-AC2E-4658-AF54-08AD80ADC204", "versionEndExcluding": "5.4.8", "versionStartIncluding": "4.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5851BBBD-A981-4EDF-908D-26777D56BC28", "versionEndExcluding": "5.5.8", "versionStartExcluding": "5.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "C297270E-797B-41F7-8C38-6CBE70F5F576", "versionEndExcluding": "5.6.5", "versionStartIncluding": "5.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEEE37C3-D9F9-45C6-BB6F-FF1D4BDC7753", "versionEndExcluding": "5.7.3", "versionStartIncluding": "5.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "B61465FD-C06C-48A7-BF01-5AAA5C690546", "versionEndExcluding": "5.8.2", "versionStartIncluding": "5.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository." }, { "lang": "es", "value": "La edici\u00f3n en navegador de Atlassian Bitbucket Server, en versiones 4.13.0 anteriores a la 5.4.8 (la versi\u00f3n solucionada de la versi\u00f3n 4.13.0 hasta la 5.4.7), versiones 5.5.0 anteriores a la 5.5.8 (la versi\u00f3n solucionada de las versiones 5.5.x), versiones 5.6.0 anteriores a la 5.6.5 (la versi\u00f3n solucionada de las versiones 5.6.x), versiones 5.7.0 anteriores a la 5.7.3 (la versi\u00f3n solucionada de las versiones 5.7.x) y versiones 5.8.0 anteriores a la 5.8.2 (la versi\u00f3n solucionada para 5.8.x), permite que usuarios autenticados obtengan ejecuci\u00f3n remota de c\u00f3digo mediante la caracter\u00edstica de edici\u00f3n en navegador editando un enlace simb\u00f3lico en un repositorio." } ], "id": "CVE-2018-5225", "lastModified": "2024-11-21T04:08:22.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-22T13:29:00.810", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103488" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/x/3WNsO" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/x/3WNsO" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10684" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-18 20:15
Modified
2024-11-21 05:29
Severity ?
Summary
The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12753 | Issue Tracking, Vendor Advisory | |
security@atlassian.com | https://www.kb.cert.org/vuls/id/240785 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12753 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/240785 | Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "8494F78A-D66A-406E-B395-9DB33C290A84", "versionEndExcluding": "6.10.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E4BCCD6-7814-47FE-8294-AFA009FE2031", "versionEndExcluding": "7.6.4", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "742F96A9-980E-463E-AB11-4347389DEC13", "versionEndExcluding": "7.10.1", "versionStartIncluding": "7.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory." }, { "lang": "es", "value": "El Microsoft Windows Installer para Atlassian Bitbucket Server y Data Center versiones anteriores a 6.10.9, versiones 7.x anteriores a 7.6.4 y desde versi\u00f3n 7.7.0 versiones anteriores a 7.10.1, permite a los atacantes locales escalar privilegios debido a permisos d\u00e9biles en el directorio de instalaci\u00f3n" } ], "id": "CVE-2020-36233", "lastModified": "2024-11-21T05:29:06.803", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-18T20:15:12.587", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12753" }, { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/240785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/240785" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 14:29
Modified
2024-11-21 03:19
Severity ?
Summary
The repository settings resource in Atlassian Bitbucket Server before version 5.6.0 allows remote attackers to read the first line of arbitrary files via a path traversal vulnerability through the default branch name.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10592 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10592 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "D478F979-E3FE-45B1-A8EF-DDFC11EA6AD4", "versionEndExcluding": "5.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The repository settings resource in Atlassian Bitbucket Server before version 5.6.0 allows remote attackers to read the first line of arbitrary files via a path traversal vulnerability through the default branch name." }, { "lang": "es", "value": "El recurso de opciones del repositorio en Atlassian Bitbucket Server, en versiones anteriores a la 5.6.0, permite que atacantes remotos lean la primera l\u00ednea de archivos arbitrarios mediante una vulnerabilidad de salto de directorio a trav\u00e9s del nombre de rama por defecto." } ], "id": "CVE-2017-18038", "lastModified": "2024-11-21T03:19:13.513", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T14:29:00.780", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10592" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-03 14:29
Modified
2024-11-21 04:42
Severity ?
Summary
Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-11706 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-11706 | Mitigation, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6215D87-F4E1-445C-B201-89F411229CA4", "versionEndExcluding": "5.13.6", "versionStartIncluding": "5.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFC24FA-DFFB-45B6-8F63-3AFDE1CC5464", "versionEndExcluding": "5.14.4", "versionStartIncluding": "5.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FD74B56-390D-48CB-93BB-0452869D58D7", "versionEndExcluding": "5.15.3", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F6EA7D6-40E5-4F3D-B5C4-16DB7AB421A6", "versionEndExcluding": "5.16.3", "versionStartIncluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D61084D-DA80-4EAD-AABA-DD94F9A69475", "versionEndExcluding": "6.0.3", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E69F799-F16F-4C25-AE84-5D73CBEAD71D", "versionEndExcluding": "6.1.2", "versionStartIncluding": "6.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool." }, { "lang": "es", "value": "Atlassian Bitbucket Data Center con licencias que comienzan con la versi\u00f3n 5.13.0 anterior a la 5.13.6 (la versi\u00f3n fija para 5.13.x), desde la versi\u00f3n 5.14.0 anterior a la 5.14.4 (versi\u00f3n fija para la 5.14.x), desde la versi\u00f3n 5.15.0 hasta la 5.15. 3 (versi\u00f3n fija para 5.15.x), de versi\u00f3n 5.16.0 anterior a 5.16.3 (versi\u00f3n fija de 5.16.x), desde versi\u00f3n 6.0.0 anterior a 6.0.3 (versi\u00f3n fija para 6.0.x), y desde versi\u00f3n 6.1.0 anterior a 6.1.2 (la versi\u00f3n fija para 6.1.x), permite a los atacanterior remotos con permisos de administrador lograr la ejecuci\u00f3n de c\u00f3digo remota en una instancia del servidor Bitbucket por medio de un salto de path (path trasversal) de la herramienta de migraci\u00f3n del Centro de Datos." } ], "id": "CVE-2019-3397", "lastModified": "2024-11-21T04:42:01.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-03T14:29:00.293", "references": [ { "source": "security@atlassian.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-11706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-11706" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-09 18:15
Modified
2024-11-21 05:02
Severity ?
Summary
Webhooks in Atlassian Bitbucket Server from version 5.4.0 before version 7.3.1 allow remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12433 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12433 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "99564E41-2060-461B-93B2-E51AFBE52970", "versionEndExcluding": "7.3.1", "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Webhooks in Atlassian Bitbucket Server from version 5.4.0 before version 7.3.1 allow remote attackers to access the content of internal network resources via a Server-Side Request Forgery (SSRF) vulnerability." }, { "lang": "es", "value": "Webhooks en Atlassian Bitbucket Server desde la versi\u00f3n 5.4.0 anterior a la versi\u00f3n 7.3.1, permiten a atacantes remotos acceder al contenido de los recursos de la red interna mediante una vulnerabilidad de tipo Server-Side Request Forgery (SSRF)" } ], "id": "CVE-2020-14170", "lastModified": "2024-11-21T05:02:47.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-09T18:15:10.770", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12433" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12433" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-10 03:59
Modified
2024-11-21 02:51
Severity ?
Summary
Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.securityfocus.com/bid/97515 | Third Party Advisory, VDB Entry | |
cret@cert.org | https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html | Vendor Advisory | |
cret@cert.org | https://jira.atlassian.com/browse/BSERV-8819 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/97515 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-8819 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "82677FFC-00C8-46B2-B163-BD15D46F3B90", "versionEndExcluding": "4.7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Server before 4.7.1 allows remote attackers to read the first line of an arbitrary file via a directory traversal attack on the pull requests resource." }, { "lang": "es", "value": "Atlassian Bitbucket Server en versiones anteriores a 4.7.1 permite a atacantes remotos leer la primera l\u00ednea de un archivo arbitrario a trav\u00e9s de un ataque de salto de directorio en el recurso de solicitudes de extracci\u00f3n." } ], "id": "CVE-2016-4320", "lastModified": "2024-11-21T02:51:51.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-10T03:59:01.247", "references": [ { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97515" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html" }, { "source": "cret@cert.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-8819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://confluence.atlassian.com/bitbucketserver/bitbucket-server-4-7-release-notes-829052416.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-8819" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-08 04:15
Modified
2024-11-21 04:27
Severity ?
Summary
The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:troubleshooting_and_support:*:*:*:*:*:*:*:*", "matchCriteriaId": "093A33BE-D93B-4CBC-9BF3-B37207CBAD84", "versionEndExcluding": "1.17.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "A17D5A1F-2408-4768-9DC3-F850B21B64AD", "versionEndExcluding": "6.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF79AB35-E420-4475-AD28-FC219C636C8B", "versionEndExcluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC203A88-CA6B-4F1A-A68D-9C2CDE8F67FC", "versionEndExcluding": "7.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "1361951B-0754-45FF-96E4-8A886C24411B", "versionEndExcluding": "3.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "matchCriteriaId": "40EB5F54-C9BD-4299-A616-E3A8E20C77FB", "versionEndExcluding": "4.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "matchCriteriaId": "452D57FA-0A0B-486F-9D4B-45487B68FFB9", "versionEndExcluding": "4.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira:*:*:*:*:*:*:*:*", "matchCriteriaId": "76FE371E-3000-464E-ADEE-033BF2989429", "versionEndExcluding": "8.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Atlassian Troubleshooting and Support Tools plugin prior to version 1.17.2 allows an unprivileged user to initiate periodic log scans and send the results to a user-specified email address due to a missing authorization check. The email message may contain configuration information about the application that the plugin is installed into. A vulnerable version of the plugin is included with Bitbucket Server / Data Center before 6.6.0, Confluence Server / Data Center before 7.0.1, Jira Server / Data Center before 8.3.2, Crowd / Crowd Data Center before 3.6.0, Fisheye before 4.7.2, Crucible before 4.7.2, and Bamboo before 6.10.2." }, { "lang": "es", "value": "El plugin Atlassian Troubleshooting and Support anterior a versi\u00f3n 1.17.2, permite a un usuario sin privilegios iniciar escaneos de registros peri\u00f3dicos y enviar los resultados a una direcci\u00f3n de correo electr\u00f3nico especificada por el usuario debido a una falta de comprobaci\u00f3n de autorizaci\u00f3n. El mensaje de correo electr\u00f3nico puede contener informaci\u00f3n de configuraci\u00f3n sobre la aplicaci\u00f3n en la que el plugin est\u00e1 instalado. Se incluye una versi\u00f3n vulnerable del plugin con Bitbucket Server/Data Center versiones anteriores a 6.6.0, Confluence Server / Data Center versiones anteriores a 7.0.1, Jira Server / Data Center versiones anteriores a 8.3.2, Crowd / Crowd Data Center versiones anteriores a 3.6.0, Fisheye versiones anteriores a 4.7.2, Crucible versiones anteriores a 4.7.2 y Bamboo versiones anteriores a 6.10.2." } ], "id": "CVE-2019-15005", "lastModified": "2024-11-21T04:27:51.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-08T04:15:10.307", "references": [ { "source": "security@atlassian.com", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-20647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://herolab.usd.de/security-advisories/usd-2019-0016/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-20647" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-07-09 18:15
Modified
2024-11-21 05:02
Severity ?
Summary
Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12434 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12434 | Issue Tracking, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "928164DF-4BFA-4103-92EB-E4EEC630485C", "versionEndExcluding": "7.2.4", "versionStartIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack." }, { "lang": "es", "value": "Atlassian Bitbucket Server desde la versi\u00f3n 4.9.0 anterior a la versi\u00f3n 7.2.4, permite a atacantes remotos interceptar peticiones de importaci\u00f3n de repositorios sin cifrar mediante un ataque Man-in-the-Middle (MITM)" } ], "id": "CVE-2020-14171", "lastModified": "2024-11-21T05:02:47.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-09T18:15:10.850", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12434" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-20 18:15
Modified
2024-11-21 06:53
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "218C960A-04C6-4242-BEBA-C81CF5F1F722", "versionEndExcluding": "7.2.10", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "E360CDE0-FD1E-4337-8268-DB89CF605EE0", "versionEndExcluding": "8.0.9", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0913EE0-2046-4E7E-966D-DC894E34D12B", "versionEndExcluding": "8.1.8", "versionStartIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", "matchCriteriaId": "D182C1B1-A5FF-4777-9835-4E9114BB68DC", "versionEndExcluding": "8.2.4", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCD53E4-3169-4E8A-88D1-38BE51D09DD3", "versionEndExcluding": "7.6.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B878E40-95A7-40A7-9C52-6BC0C2FD3F54", "versionEndExcluding": "7.17.8", "versionStartIncluding": "7.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "46305D5A-7F7B-4A04-9DAD-E582D1193A7E", "versionEndExcluding": "7.19.5", "versionStartIncluding": "7.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A96B135B-9272-457E-A557-6566554262D3", "versionEndExcluding": "7.20.2", "versionStartIncluding": "7.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "62956861-BEDE-40C8-B628-C831087E7BDB", "versionEndExcluding": "7.21.2", "versionStartIncluding": "7.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A85565F-3F80-4E00-A706-AB4B2EAA4AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "99E2E3C0-CDF0-4D79-80A6-85E71B947ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C543CA6-8E8A-476C-AB27-614DF4EC68A5", "versionEndExcluding": "7.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "45FD913B-45DE-4CA8-9733-D62F54B19E74", "versionEndExcluding": "7.13.7", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "12E753EB-0D31-448B-B8DE-0A95434CC97C", "versionEndExcluding": "7.14.3", "versionStartIncluding": "7.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE114494-74F0-454C-AAC4-8B8E5F1C67D0", "versionEndExcluding": "7.15.2", "versionStartIncluding": "7.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "90BB3572-29ED-415F-AD34-00EB76271F9C", "versionEndExcluding": "7.16.4", "versionStartIncluding": "7.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "30EF756A-B4E9-4E5D-BE6F-02CE95F12C9C", "versionEndExcluding": "7.17.4", "versionStartIncluding": "7.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "A56B6A10-E23F-49EF-8C07-1AEDFCAE2788", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE8BE634-1599-4790-9410-6CA43BC60C4D", "versionEndExcluding": "7.4.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "52E68DFD-48F5-4949-AFEA-3829CA5DFC04", "versionEndExcluding": "7.13.7", "versionStartIncluding": "7.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DCDEC6C-4515-4CAA-9D82-7BF68A3AAE7E", "versionEndExcluding": "7.14.3", "versionStartIncluding": "7.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9948F94-DF67-4E3C-8CD4-417D57FBC60F", "versionEndExcluding": "7.15.2", "versionStartIncluding": "7.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E63ECB-85A8-4D41-A9B5-9FFF18D9CDB1", "versionEndExcluding": "7.16.4", "versionStartIncluding": "7.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "694171BD-FAE2-472C-8183-04BCA2F7B9A7", "versionEndExcluding": "7.17.4", "versionStartIncluding": "7.17.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AC5E81B-DA4B-45E7-9584-4B576E49FD8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE028964-B3FC-4883-9967-68DE46EE7F6F", "versionEndExcluding": "4.3.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "matchCriteriaId": "57DC9E2A-4C89-420D-9330-F11E56BF2F83", "versionEndExcluding": "4.4.2", "versionStartIncluding": "4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crowd:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C50A718F-C67B-4462-BB7E-F80408DEF07D", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "matchCriteriaId": "92329A2E-13E8-4818-85AB-3E7F479411EF", "versionEndExcluding": "4.8.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*", "matchCriteriaId": "30DDE751-CA88-4CFB-9E60-4243851B4B53", "versionEndExcluding": "4.8.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "D91B8507-A7A7-4B74-9999-F1DEA9F487A9", "versionEndExcluding": "8.13.22", "versionStartIncluding": "8.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "963AE427-2897-42CB-AE11-654D700E690B", "versionEndExcluding": "8.20.10", "versionStartIncluding": "8.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_data_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7CD8891-BB97-4AD3-BEE4-6CCA0D8A2D85", "versionEndExcluding": "8.22.4", "versionStartIncluding": "8.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E73A5202-6114-48E6-8F9B-C03B2E707055", "versionEndExcluding": "8.13.22", "versionStartIncluding": "8.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "D22AB11D-1D73-45DC-803C-146EFED18CDA", "versionEndExcluding": "8.20.10", "versionStartIncluding": "8.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB2091E9-0B14-4786-852F-454C56D20839", "versionEndExcluding": "8.22.4", "versionStartIncluding": "8.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "1451C219-8AAA-4165-AE2C-033EF7B6F93A", "versionEndExcluding": "4.13.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_desk:*:*:*:*:server:*:*:*", "matchCriteriaId": "BD23F987-0F14-4938-BB51-4EE61C24EB62", "versionEndExcluding": "4.13.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "39F77953-41D7-4398-9F07-2A057A993762", "versionEndExcluding": "4.20.10", "versionStartIncluding": "4.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "matchCriteriaId": "CADBE0E7-36D9-4F6F-BEE6-A1E0B9428C2A", "versionEndExcluding": "4.20.10", "versionStartIncluding": "4.14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:data_center:*:*:*", "matchCriteriaId": "DC0DB08B-2034-4691-A7B2-3E5F8B6318B1", "versionEndExcluding": "4.22.4", "versionStartIncluding": "4.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:jira_service_management:*:*:*:*:server:*:*:*", "matchCriteriaId": "97A17BE7-7CCC-46D8-A317-53E2B026DF6E", "versionEndExcluding": "4.22.4", "versionStartIncluding": "4.21.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. Atlassian Bitbucket versions are affected before 7.6.16, from 7.7.0 before 7.17.8, from 7.18.0 before 7.19.5, from 7.20.0 before 7.20.2, from 7.21.0 before 7.21.2, and versions 8.0.0 and 8.1.0. Atlassian Confluence versions are affected before 7.4.17, from 7.5.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and version 7.21.0. Atlassian Crowd versions are affected before 4.3.8, from 4.4.0 before 4.4.2, and version 5.0.0. Atlassian Fisheye and Crucible versions before 4.8.10 are affected. Atlassian Jira versions are affected before 8.13.22, from 8.14.0 before 8.20.10, and from 8.21.0 before 8.22.4. Atlassian Jira Service Management versions are affected before 4.13.22, from 4.14.0 before 4.20.10, and from 4.21.0 before 4.22.4." }, { "lang": "es", "value": "Una vulnerabilidad en varios productos de Atlassian permite a un atacante remoto no autenticado omitir los filtros Servlet usados por aplicaciones de primera y tercera parte. El impacto depende de los filtros usados por cada aplicaci\u00f3n y de c\u00f3mo son usados los filtros. Esta vulnerabilidad puede resultar en una omisi\u00f3n de la autenticaci\u00f3n y un ataque de tipo cross-site scripting. Atlassian ha publicado actualizaciones que corrigen la causa principal de esta vulnerabilidad, pero no ha enumerado exhaustivamente todas las consecuencias potenciales de esta vulnerabilidad. Est\u00e1n afectadas las versiones de Atlassian Bamboo anteriores a 8.0.9, desde 8.1.0 hasta 8.1.8, y desde la 8.2.0 hasta 8.2.4. Las versiones de Atlassian Bitbucket est\u00e1n afectadas anteriores a 7.6.16, desde la 7.7.0 anteriores a 7.17.8, desde la 7.18.0 anteriores a 7.19.5, desde la 7.20.0 anteriores a 7.20.2, desde la 7.21.0 anteriores a 7.21.2, y las versiones 8.0.0 y 8.1.0. Est\u00e1n afectadas las versiones de Atlassian Confluence anteriores a 7.4.17, desde la 7.5.0 anteriores a 7.13.7, desde la 7.14.0 anteriores a 7.14.3, desde la 7.15.0 anteriores a 7.15.2, desde la 7.16.0 anteriores a 7.16.4, desde la 7.17.0 anteriores a 7.17.4 y la versi\u00f3n 7.21.0. Est\u00e1n afectadas las versiones de Atlassian Crowd anteriores a 4.3.8, desde la 4.4.0 hasta 4.4.2, y la versi\u00f3n 5.0.0. Est\u00e1n afectadas las versiones de Atlassian Fisheye y Crucible anteriores a 4.8.10. Est\u00e1n afectadas las versiones de Atlassian Jira anteriores a 8.13.22, desde la 8.14.0 hasta 8.20.10, y desde la 8.21.0 hasta 8.22.4. Las versiones de Atlassian Jira Service Management est\u00e1n afectadas anteriores a 4.13.22, desde la 4.14.0 anteriores a 4.20.10, y desde la 4.21.0 anteriores a 4.22.4" } ], "id": "CVE-2022-26136", "lastModified": "2024-11-21T06:53:30.297", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-07-20T18:15:08.487", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BAM-21795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13370" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CRUC-8541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/CWD-5815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/FE-7410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JRASERVER-73897" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/JSDSERVER-11863" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-180" } ], "source": "security@atlassian.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-15 21:15
Modified
2024-11-21 04:27
Severity ?
Summary
Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, and from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via certain user input fields. A remote attacker with user level permissions can exploit this vulnerability to run arbitrary commands on the victim's systems. Using a specially crafted payload as user input, the attacker can execute arbitrary commands on the victim's Bitbucket Server or Bitbucket Data Center instance.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12098 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12098 | Issue Tracking, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "3421F4B2-A825-4715-A7F3-CB2EA2B8196D", "versionEndExcluding": "5.6.11", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "48C8C6EE-1C20-4A8D-BEDA-166FBBEFCF2F", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFF37587-82F5-4EE0-A937-28C38801D764", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E0BC42-C30E-4A8E-A8EE-FBDE1DE54320", "versionEndExcluding": "6.2.7", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9684FBA-86AA-41DC-BE24-E569528D73F5", "versionEndExcluding": "6.3.6", "versionStartIncluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB2AEC-BCD8-4F4C-8B46-DA7C1106CC19", "versionEndExcluding": "6.4.4", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EFDFE4F-C06F-4E7D-B4FB-9AF75ADF9B0D", "versionEndExcluding": "6.5.3", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "24C8E399-F9B1-4C2F-8950-743D5648FCB8", "versionEndExcluding": "6.6.3", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF8E5098-21B9-416A-A83B-9F9141DEEC7C", "versionEndExcluding": "6.7.3", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "866E87CD-8AD5-4241-82F9-80720F1E794E", "versionEndExcluding": "6.8.2", "versionStartIncluding": "6.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2873B168-8A85-4AB0-BD92-95423928F20D", "versionEndExcluding": "6.9.1", "versionStartIncluding": "6.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center versions starting from version 3.0.0 before version 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, and from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via certain user input fields. A remote attacker with user level permissions can exploit this vulnerability to run arbitrary commands on the victim\u0027s systems. Using a specially crafted payload as user input, the attacker can execute arbitrary commands on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance." }, { "lang": "es", "value": "Bitbucket Server y Bitbucket Data Center versiones comenzando desde 3.0.0 anteriores a la versi\u00f3n 5.16.11, desde versi\u00f3n 6.0.0 anteriores a la versi\u00f3n 6.0.11, desde versi\u00f3n 6.1.0 anteriores a la versi\u00f3n 6.1.9, desde versi\u00f3n 6.2.0 anteriores a la versi\u00f3n 6.2.7, desde versi\u00f3n 6.3.0 anteriores a la versi\u00f3n 6.3.6, desde versi\u00f3n 6.4.0 anteriores a la versi\u00f3n 6.4.4, desde versi\u00f3n 6.5.0 anteriores a la versi\u00f3n 6.5.3, desde versi\u00f3n 6.6.0 anteriores a la versi\u00f3n 6.6.3, desde versi\u00f3n 6.7.0 anteriores a la versi\u00f3n 6.7.3, desde versi\u00f3n 6.8.0 anteriores a la versi\u00f3n 6.8.2 y desde versi\u00f3n 6.9.0 anteriores a la versi\u00f3n 6.9.1, ten\u00edan una vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota por medio de ciertos campos de entrada de usuario. Un atacante remoto con permisos de nivel de usuario puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios en los sistemas de la v\u00edctima. Utilizando una carga \u00fatil especialmente dise\u00f1ada como entrada de usuario, el atacante puede ejecutar comandos arbitrarios sobre las instancias Bitbucket Server o Bitbucket Data de las v\u00edctimas." } ], "id": "CVE-2019-15010", "lastModified": "2024-11-21T04:27:52.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-15T21:15:12.313", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12098" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12098" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-15 21:15
Modified
2024-11-21 04:27
Severity ?
Summary
Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12100 | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12100 | Issue Tracking, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "77D2D5CB-064D-44C7-9C80-46BDD4A833B3", "versionEndExcluding": "5.6.11", "versionStartIncluding": "4.13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "48C8C6EE-1C20-4A8D-BEDA-166FBBEFCF2F", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFF37587-82F5-4EE0-A937-28C38801D764", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E0BC42-C30E-4A8E-A8EE-FBDE1DE54320", "versionEndExcluding": "6.2.7", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9684FBA-86AA-41DC-BE24-E569528D73F5", "versionEndExcluding": "6.3.6", "versionStartIncluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB2AEC-BCD8-4F4C-8B46-DA7C1106CC19", "versionEndExcluding": "6.4.4", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EFDFE4F-C06F-4E7D-B4FB-9AF75ADF9B0D", "versionEndExcluding": "6.5.3", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "24C8E399-F9B1-4C2F-8950-743D5648FCB8", "versionEndExcluding": "6.6.3", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF8E5098-21B9-416A-A83B-9F9141DEEC7C", "versionEndExcluding": "6.7.3", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "866E87CD-8AD5-4241-82F9-80720F1E794E", "versionEndExcluding": "6.8.2", "versionStartIncluding": "6.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2873B168-8A85-4AB0-BD92-95423928F20D", "versionEndExcluding": "6.9.1", "versionStartIncluding": "6.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center from version 4.13. before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the edit-file request. A remote attacker with write permission on a repository can write to any arbitrary file to the victims Bitbucket Server or Bitbucket Data Center instance using the edit-file endpoint, if the user has Bitbucket Server or Bitbucket Data Center running, and has the permission to write the file at that destination. In some cases, this can result in execution of arbitrary code by the victims Bitbucket Server or Bitbucket Data Center instance." }, { "lang": "es", "value": "Bitbucket Server y Bitbucket Data Center desde la versi\u00f3n 4.13. anteriores a la versi\u00f3n 5.16.11, desde versi\u00f3n 6.0.0 anteriores a la versi\u00f3n 6.0.11, desde versi\u00f3n 6.1.0 anteriores a la versi\u00f3n 6.1.9, desde versi\u00f3n 6.2.0 anteriores a la versi\u00f3n 6.2.7, desde versi\u00f3n 6.3.0 anteriores a la versi\u00f3n 6.3.6, desde versi\u00f3n 6.4.0 anteriores a la versi\u00f3n 6.4.4, desde versi\u00f3n 6.5.0 anteriores a la versi\u00f3n 6.5.3, desde versi\u00f3n 6.6.0 anteriores a 6.6.3, desde versi\u00f3n 6.7.0 anteriores a 6.7.3, desde versi\u00f3n 6.8.0 anteriores a la versi\u00f3n 6.8.2, desde versi\u00f3n 6.9.0 anteriores a la versi\u00f3n 6.9.1, tiene una vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota por medio de la petici\u00f3n edit-file. Un atacante remoto con permiso de escritura en un repositorio puede escribir en cualquier archivo arbitrario en las instancias de Bitbucket Server o Bitbucket Data Center de las v\u00edctimas utilizando el endpoint edit-file, si el usuario tiene Bitbucket Server o Bitbucket Data Center en ejecuci\u00f3n, y posee permiso para escribir el archivo en ese destino. En algunos casos, esto puede resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario para las instancias Bitbucket Server o Bitbucket Data Center de las v\u00edctimas." } ], "id": "CVE-2019-15012", "lastModified": "2024-11-21T04:27:52.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-15T21:15:12.390", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12100" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-17 00:15
Modified
2024-11-21 07:27
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://confluence.atlassian.com/x/Y4hXRg | Mitigation, Release Notes, Vendor Advisory | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-13522 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://confluence.atlassian.com/x/Y4hXRg | Mitigation, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-13522 | Issue Tracking, Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "724D75B1-262B-4834-BDF9-359992FE358F", "versionEndExcluding": "7.6.19", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DDB30B8-27BB-4754-A801-CC6D7FBD112D", "versionEndExcluding": "7.17.12", "versionStartIncluding": "7.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "C46D83C6-2375-4187-9A5F-1AD81A6520DA", "versionEndExcluding": "7.21.6", "versionStartIncluding": "7.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "18D68073-ED08-433F-9EB3-6BE4D58B08E6", "versionEndExcluding": "8.0.5", "versionStartIncluding": "7.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C1B0213-8CA7-4179-90D3-FCFE8BBE33BA", "versionEndExcluding": "8.1.5", "versionStartIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D270F32-1BB2-46F8-8737-4CB39508EDD4", "versionEndExcluding": "8.2.4", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF6224A3-4AD8-4DA7-8E68-A890B3915337", "versionEndExcluding": "8.3.3", "versionStartIncluding": "8.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "224634CB-9CA5-4292-B3F8-B3A86E4ADD70", "versionEndExcluding": "8.4.2", "versionStartIncluding": "8.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled \u201cAllow public signup\u201d." }, { "lang": "es", "value": "Existe una vulnerabilidad de inyecci\u00f3n de comandos mediante variables de entorno en Bitbucket Server y Data Center. Un atacante con permiso para controlar su nombre de usuario puede aprovechar este problema para ejecutar c\u00f3digo arbitrario en el sistema. Esta vulnerabilidad puede no autenticarse si la instancia de Bitbucket Server y Data Center ha habilitado \"Allow public signup\"." } ], "id": "CVE-2022-43781", "lastModified": "2024-11-21T07:27:14.543", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-11-17T00:15:18.483", "references": [ { "source": "security@atlassian.com", "tags": [ "Mitigation", "Release Notes", "Vendor Advisory" ], "url": "https://confluence.atlassian.com/x/Y4hXRg" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Release Notes", "Vendor Advisory" ], "url": "https://confluence.atlassian.com/x/Y4hXRg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13522" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 14:29
Modified
2024-11-21 03:19
Severity ?
Summary
The Github repository importer in Atlassian Bitbucket Server before version 5.3.0 allows remote attackers to determine if a service they could not otherwise reach has open ports via a Server Side Request Forgery (SSRF) vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/102932 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10591 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102932 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10591 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BBA4F7C-4E62-4546-B1FF-ACC467157122", "versionEndExcluding": "5.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Github repository importer in Atlassian Bitbucket Server before version 5.3.0 allows remote attackers to determine if a service they could not otherwise reach has open ports via a Server Side Request Forgery (SSRF) vulnerability." }, { "lang": "es", "value": "El importador de repositorios Github en Atlassian Bitbucket Server, en versiones anteriores a la 5.3.0, permite que atacantes remotos determinen si un servicio al que no hubiesen podido acceder de otra forma tiene puertos abiertos mediante una vulnerabilidad de SSRF (Server-Side Request Forgery)." } ], "id": "CVE-2017-18036", "lastModified": "2024-11-21T03:19:13.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T14:29:00.670", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102932" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10591" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "security@atlassian.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-918" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 14:29
Modified
2024-11-21 03:19
Severity ?
Summary
The git repository tag rest resource in Atlassian Bitbucket Server from version 3.7.0 before 4.14.11 (the fixed version for 4.14.x), from version 5.0.0 before 5.0.9 (the fixed version for 5.0.x), from version 5.1.0 before 5.1.8 (the fixed version for 5.1.x), from version 5.2.0 before 5.2.6 (the fixed version for 5.2.x), from version 5.3.0 before 5.3.4 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.2 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.1 (the fixed version for 5.5.x) and before 5.6.0 allows remote attackers to read arbitrary files via a path traversal vulnerability through the name of a git tag.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10595 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10595 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
atlassian | bitbucket | * | |
atlassian | bitbucket | * | |
atlassian | bitbucket | * | |
atlassian | bitbucket | * | |
atlassian | bitbucket | * | |
atlassian | bitbucket | * | |
atlassian | bitbucket | 5.5.0 | |
atlassian | bitbucket | 5.5.2 | |
atlassian | bitbucket | 5.5.3 | |
atlassian | bitbucket | 5.5.4 | |
atlassian | bitbucket | 5.5.5 | |
atlassian | bitbucket | 5.5.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C25D6B2-925D-454F-94A4-932C36750004", "versionEndExcluding": "4.14.11", "versionStartIncluding": "3.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DB1A81-D0F0-4FEC-B4D7-4D3743970D70", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "892FF567-63AF-45A6-A4FC-DC49EAA8BE16", "versionEndExcluding": "5.1.8", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "637D06F4-A793-43D0-A93E-E742E16DE64D", "versionEndExcluding": "5.2.6", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "85004234-0089-4076-9151-B304C0BCBFC8", "versionEndExcluding": "5.3.4", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C178873-0E12-45FA-B7A5-3AAE98CB7F72", "versionEndExcluding": "5.4.2", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "C087CCB5-E39F-4338-B390-D929C0540BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "25FC3472-E23A-49E4-BC52-31E36514B688", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "80FB88BA-26C7-4966-BE36-9511F94D7AEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "2D289E4E-3E36-44D9-A1AC-D88E271E3C36", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4045969-A843-403E-BE74-86FE57C89D00", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "18883184-B4FF-429F-8DD1-3A310226F494", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The git repository tag rest resource in Atlassian Bitbucket Server from version 3.7.0 before 4.14.11 (the fixed version for 4.14.x), from version 5.0.0 before 5.0.9 (the fixed version for 5.0.x), from version 5.1.0 before 5.1.8 (the fixed version for 5.1.x), from version 5.2.0 before 5.2.6 (the fixed version for 5.2.x), from version 5.3.0 before 5.3.4 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.2 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.1 (the fixed version for 5.5.x) and before 5.6.0 allows remote attackers to read arbitrary files via a path traversal vulnerability through the name of a git tag." }, { "lang": "es", "value": "El recurso rest de etiquetas de git repository en Atlassian Bitbucket Server, desde la versi\u00f3n 3.7.0 hasta la 4.14.11 (la versi\u00f3n solucionada para 4.14.x); desde la versi\u00f3n 5.0.0 hasta la 5.0.9 (la versi\u00f3n solucionada para 5.0.x); desde la versi\u00f3n 5.1.0 hasta la 5.1.8 (la versi\u00f3n solucionada para 5.1.x); desde la versi\u00f3n 5.2.0 hasta la 5.2.6 (la versi\u00f3n solucionada para 5.2.x); desde la versi\u00f3n 5.3.0 hasta la 5.3.4 (la versi\u00f3n solucionada para 5.3.x); desde la versi\u00f3n 5.4.0 hasta la 5.4.2 (la versi\u00f3n solucionada para 5.4.x); desde la versi\u00f3n 5.5.0 hasta la 5.5.1 (la versi\u00f3n solucionada para 5.5.x) y en versiones anteriores a la 5.6.0 permite que atacantes remotos lean archivos arbitrarios mediante una vulnerabilidad de salto de directorio a trav\u00e9s del nombre de una etiqueta git." } ], "id": "CVE-2017-18037", "lastModified": "2024-11-21T03:19:13.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T14:29:00.733", "references": [ { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10595" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-19 15:15
Modified
2024-11-21 04:27
Severity ?
Summary
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7DE8AA-35F7-4B1E-8FE7-4672016063CE", "versionEndExcluding": "5.16.10", "versionStartIncluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D42EE6-BE67-483C-B547-47E3CFAAE043", "versionEndExcluding": "6.0.10", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "909D4209-CABE-4B18-9268-4564AA66F9C3", "versionEndExcluding": "6.1.8", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A73B0184-4B34-4946-A617-DC9F33354718", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "C690612E-6290-4BA9-8E58-D9F206AB4718", "versionEndExcluding": "6.3.5", "versionStartIncluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4C1EAA1-54B9-46E8-99D9-2E60A8E058F5", "versionEndExcluding": "6.4.3", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5299C67-E9BC-4786-AF22-F0C3ADE7D94E", "versionEndExcluding": "6.5.2", "versionStartIncluding": "6.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands." }, { "lang": "es", "value": "El end point commit diff rest en Bitbucket Server y Data Center versiones anteriores a 5.16.10 (la versi\u00f3n corregida para 5.16.x), versiones desde 6.0.0 anteriores a 6.0.10 (la versi\u00f3n corregida para 6.0.x), versiones desde 6.1.0 anteriores a 6.1. 8 (la versi\u00f3n corregida para 6.1.x), versiones desde 6.2.0 anteriores a 6.2.6 (la versi\u00f3n corregida para 6.2.x), versiones desde 6.3.0 anteriores a 6.3.5 (la versi\u00f3n corregida para 6.3.x), versiones desde 6.4. 0 anteriores a 6.4.3 (la versi\u00f3n corregida para 6.4.x), y versiones desde 6.5.0 anteriores a 6.5.2 (la versi\u00f3n corregida para 6.5.x), permite a atacantes remotos que poseen permiso acceder a un repositorio, si el acceso p\u00fablico est\u00e1 habilitado para un proyecto o repositorio, entonces los atacantes son capaces de explotar este problema de manera an\u00f3nima, leer el contenido de archivos arbitrarios en el sistema y ejecutar comandos por medio de la inyecci\u00f3n de argumentos adicionales en los comandos git." } ], "id": "CVE-2019-15000", "lastModified": "2024-11-21T04:27:50.967", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-19T15:15:15.437", "references": [ { "source": "security@atlassian.com", "url": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-11947" }, { "source": "security@atlassian.com", "url": "https://seclists.org/bugtraq/2019/Sep/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-11947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://seclists.org/bugtraq/2019/Sep/43" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-15 13:29
Modified
2024-11-21 03:19
Severity ?
Summary
Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/103040 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10594 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103040 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10594 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "59FACEA5-6BFF-4F86-AAD0-A010E635781F", "versionEndExcluding": "5.3.7", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "846BD10D-C2A1-402D-BACA-EC410D291253", "versionEndExcluding": "5.4.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "563880B8-8258-408B-AEFD-550977F2DD57", "versionEndExcluding": "5.5.6", "versionStartIncluding": "5.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CF75C29-BCCA-4994-BE58-BCD08950D0B2", "versionEndExcluding": "5.6.3", "versionStartIncluding": "5.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0A49A1F-0B79-4BB3-B53A-D4905F5E6AC5", "versionEndExcluding": "5.7.1", "versionStartIncluding": "5.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Various plugin servlet resources in Atlassian Bitbucket Server before version 5.3.7 (the fixed version for 5.3.x), from version 5.4.0 before 5.4.6 (the fixed version for 5.4.x), from version 5.5.0 before 5.5.6 (the fixed version for 5.5.x), from version 5.6.0 before 5.6.3 (the fixed version for 5.6.x), from version 5.7.0 before 5.7.1 (the fixed version for 5.7.x) and before 5.8.0 allow remote attackers to conduct clickjacking attacks via framing various resources that lacked clickjacking protection." }, { "lang": "es", "value": "Varios recursos del servlet del plugin en Atlassian Bitbucket Server, en versiones anteriores a la 5.3.7 (la versi\u00f3n solucionada para 5.3.x), desde la versi\u00f3n 5.4.0 anterior a la 5.4.6 (la versi\u00f3n solucionada para 5.4.x), desde la versi\u00f3n 5.5.0 anterior a la 5.5.6 (la versi\u00f3n solucionada para 5.5.x), desde la versi\u00f3n 5.6.0 anterior a la 5.6.3 (la versi\u00f3n solucionada para 5.6.x), desde la versi\u00f3n 5.7.0 anterior a la 5.7.1 (la versi\u00f3n solucionada para 5.7.x) y en versiones anteriores a la 5.8.0, permiten que los atacantes remotos lleven a cabo ataques de secuestro de clics integrando varios recursos que carec\u00edan de protecci\u00f3n contra secuestro de clics." } ], "id": "CVE-2017-18088", "lastModified": "2024-11-21T03:19:20.117", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-15T13:29:00.297", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103040" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10594" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-15 21:15
Modified
2024-11-21 04:38
Severity ?
Summary
Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim's Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-12099 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-12099 | Issue Tracking, Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "46BCBD19-3B62-4A81-9312-68E46D4A39D8", "versionEndExcluding": "5.6.11", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "48C8C6EE-1C20-4A8D-BEDA-166FBBEFCF2F", "versionEndExcluding": "6.0.11", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFF37587-82F5-4EE0-A937-28C38801D764", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E0BC42-C30E-4A8E-A8EE-FBDE1DE54320", "versionEndExcluding": "6.2.7", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9684FBA-86AA-41DC-BE24-E569528D73F5", "versionEndExcluding": "6.3.6", "versionStartIncluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB2AEC-BCD8-4F4C-8B46-DA7C1106CC19", "versionEndExcluding": "6.4.4", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EFDFE4F-C06F-4E7D-B4FB-9AF75ADF9B0D", "versionEndExcluding": "6.5.3", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "24C8E399-F9B1-4C2F-8950-743D5648FCB8", "versionEndExcluding": "6.6.3", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF8E5098-21B9-416A-A83B-9F9141DEEC7C", "versionEndExcluding": "6.7.3", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "866E87CD-8AD5-4241-82F9-80720F1E794E", "versionEndExcluding": "6.8.2", "versionStartIncluding": "6.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2873B168-8A85-4AB0-BD92-95423928F20D", "versionEndExcluding": "6.9.1", "versionStartIncluding": "6.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim\u0027s Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content." }, { "lang": "es", "value": "Bitbucket Server y Bitbucket Data Center versiones comenzando desde 1.0.0 anteriores a la versi\u00f3n 5.16.11, desde versi\u00f3n 6.0.0 anteriores a la versi\u00f3n 6.0.11, desde versi\u00f3n 6.1.0 anteriores a la versi\u00f3n 6.1.9, desde versi\u00f3n 6.2.0 anteriores a la versi\u00f3n 6.2.7, desde versi\u00f3n 6.3 .0 anteriores a la versi\u00f3n 6.3.6, desde versi\u00f3n 6.4.0 anteriores a la versi\u00f3n 6.4.4, desde versi\u00f3n 6.5.0 anteriores a 6.5.3, desde versi\u00f3n 6.6.0 anteriores a 6.6.3, desde versi\u00f3n 6.7.0 anteriores a la versi\u00f3n 6.7.3, desde versi\u00f3n 6.8 .0 anteriores a la versi\u00f3n 6.8.2, desde versi\u00f3n 6.9.0 anteriores a la versi\u00f3n 6.9.1, tiene una vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota por medio del enlace post-receive. Un atacante remoto con permiso para clonar y colocar archivos a un repositorio en la instancia de Bitbucket Server o Bitbucket Data Center de la v\u00edctima, puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios en los sistemas Bitbucket Server o Bitbucket Data Center, utilizando un archivo con contenido especialmente dise\u00f1ado." } ], "id": "CVE-2019-20097", "lastModified": "2024-11-21T04:38:03.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-15T21:15:12.483", "references": [ { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-12099" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-25 06:15
Modified
2024-11-21 07:13
Severity ?
Summary
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html | Exploit, Third Party Advisory, VDB Entry | |
security@atlassian.com | http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-13438 | Issue Tracking, Patch, Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-13438 | Issue Tracking, Patch, Release Notes, Vendor Advisory |
Impacted products
{ "cisaActionDue": "2022-10-21", "cisaExploitAdd": "2022-09-30", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "54F27ACB-8092-49D9-B3E6-84202A474E07", "versionEndExcluding": "7.6.17", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "4841A291-6ED4-46BF-A20D-9B6C580D0848", "versionEndExcluding": "7.17.10", "versionStartIncluding": "7.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA55F12-AE5A-4EB0-8A9D-F8C931470686", "versionEndExcluding": "7.21.4", "versionStartIncluding": "7.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF552168-931B-4D5C-8D61-371F00517217", "versionEndExcluding": "8.0.3", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "86586513-D050-4522-91EE-E10A2C0D36DA", "versionEndExcluding": "8.1.3", "versionStartIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D177223-A7CD-48D7-9AE6-709D769C8466", "versionEndExcluding": "8.2.2", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:8.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "067642A5-9F53-4ADC-956B-B2576853A3FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew." }, { "lang": "es", "value": "M\u00faltiples endpoints de la API en Atlassian Bitbucket Server y Data Center 7.0.0 versiones anteriores a 7.6.17, desde versiones 7.7.0 anteriores a 7.17.10, desde versiones 7.18.0 anteriores a 7.21.4, desde versiones 8.0.0 anteriores a 8.0.3, desde versiones 8.1. 0 versiones anteriores a 8.1.3, y desde versiones 8.2.0 anteriores a 8.2.2, y desde versiones 8.3.0 anteriores a 8.3.1, permite a atacantes remotos con permisos de lectura en un repositorio p\u00fablico o privado de Bitbucket ejecutar c\u00f3digo arbitrario enviando una petici\u00f3n HTTP maliciosa. Esta vulnerabilidad fue reportada por medio de nuestro programa Bug Bounty por TheGrandPew." } ], "id": "CVE-2022-36804", "lastModified": "2024-11-21T07:13:48.687", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-25T06:15:09.077", "references": [ { "source": "security@atlassian.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html" }, { "source": "security@atlassian.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html" }, { "source": "security@atlassian.com", "tags": [ "Issue Tracking", "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Release Notes", "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-13438" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-15 13:29
Modified
2024-11-21 03:19
Severity ?
Summary
The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter.
References
▼ | URL | Tags | |
---|---|---|---|
security@atlassian.com | http://www.securityfocus.com/bid/103038 | Third Party Advisory, VDB Entry | |
security@atlassian.com | https://jira.atlassian.com/browse/BSERV-10593 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103038 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jira.atlassian.com/browse/BSERV-10593 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "8016084B-D350-4BEB-8DF5-8535B0731E4C", "versionEndExcluding": "5.1.7", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD7D36AD-BC10-4E62-8425-E192FE08404D", "versionEndExcluding": "5.2.5", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DE43F75-BEBE-4F4F-A913-6FE0B8EF0FE3", "versionEndExcluding": "5.3.3", "versionStartIncluding": "5.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*", "matchCriteriaId": "F191B55F-E311-4B7C-90CA-0089D2044E6A", "versionEndExcluding": "5.4.1", "versionStartExcluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The download commit resource in Atlassian Bitbucket Server from version 5.1.0 before version 5.1.7, from version 5.2.0 before version 5.2.5, from version 5.3.0 before version 5.3.3 and from version 5.4.0 before version 5.4.1 allows remote attackers to write files to disk potentially allowing them to gain code execution, exploit CVE-2017-1000117 if a vulnerable version of git is in use, and or determine if an internal service exists via an argument injection vulnerability in the at parameter." }, { "lang": "es", "value": "El recurso download commit en Atlassian Bitbucket Server, desde la versi\u00f3n 5.1.0 anterior a la versi\u00f3n 5.1.7, desde la versi\u00f3n 5.2.0 anterior a la versi\u00f3n 5.2.5, desde la versi\u00f3n 5.3.0 anterior a la versi\u00f3n 5.3.3 y desde la versi\u00f3n 5.4.0 anterior a la versi\u00f3n 5.4.1, permite que atacantes remotos escriban archivos en el disco, permiti\u00e9ndoles que puedan ejecutar c\u00f3digo, explotar CVE-2017-1000117 si se est\u00e1 empleando una versi\u00f3n vulnerable de git o para determinar si existe un servicio interno por medio de una vulnerabilidad de inyecci\u00f3n de argumentos en el par\u00e1metro at." } ], "id": "CVE-2017-18087", "lastModified": "2024-11-21T03:19:20.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-15T13:29:00.250", "references": [ { "source": "security@atlassian.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103038" }, { "source": "security@atlassian.com", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10593" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://jira.atlassian.com/browse/BSERV-10593" } ], "sourceIdentifier": "security@atlassian.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }