CVE-2024-21684
Vulnerability from cvelistv5
Published
2024-07-24 18:00
Modified
2024-11-05 19:19
Severity ?
EPSS score ?
Summary
There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2.
This open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.
Atlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Atlassian | Bitbucket Data Center |
Version: 8.19.1 Version: 8.9.0 to 8.9.12 Version: 8.8.0 to 8.8.7 Version: 8.7.0 to 8.7.5 Version: 8.6.0 to 8.6.4 Version: 8.5.0 to 8.5.4 Version: 8.4.0 to 8.4.4 Version: 8.3.0 to 8.3.4 Version: 8.2.2 to 8.2.4 Version: 8.1.3 to 8.1.5 Version: 8.0.3 to 8.0.5 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-21684", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T18:45:18.293627Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-601", "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T19:19:43.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:27:36.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://jira.atlassian.com/browse/BSERV-19454" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Bitbucket Data Center", "vendor": "Atlassian", "versions": [ { "status": "affected", "version": "8.19.1" }, { "status": "affected", "version": "8.9.0 to 8.9.12" }, { "status": "affected", "version": "8.8.0 to 8.8.7" }, { "status": "affected", "version": "8.7.0 to 8.7.5" }, { "status": "affected", "version": "8.6.0 to 8.6.4" }, { "status": "affected", "version": "8.5.0 to 8.5.4" }, { "status": "affected", "version": "8.4.0 to 8.4.4" }, { "status": "affected", "version": "8.3.0 to 8.3.4" }, { "status": "affected", "version": "8.2.2 to 8.2.4" }, { "status": "affected", "version": "8.1.3 to 8.1.5" }, { "status": "affected", "version": "8.0.3 to 8.0.5" }, { "status": "unaffected", "version": "8.19.2 to 8.19.6" }, { "status": "unaffected", "version": "8.9.13 to 8.9.17" } ] } ], "credits": [ { "lang": "en", "value": "Taha YILDIRIM" } ], "descriptions": [ { "lang": "en", "value": "There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2.\n\nThis open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions." } ], "metrics": [ { "cvssV3_0": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Open Redirect", "lang": "en", "type": "Open Redirect" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:00:02.553Z", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "url": "https://jira.atlassian.com/browse/BSERV-19454" } ] } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2024-21684", "datePublished": "2024-07-24T18:00:01.656Z", "dateReserved": "2024-01-01T00:05:33.846Z", "dateUpdated": "2024-11-05T19:19:43.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-21684\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2024-07-24T18:15:03.793\",\"lastModified\":\"2024-11-05T20:35:18.520\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2.\\n\\nThis open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.\\n\\nAtlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de redireccionamiento abierto de baja gravedad en las versiones afectadas de Bitbucket Data Center. Las versiones de Bitbucket DC de 8.0.0 a 8.9.12 y de 8.19.0 a 8.19.1 se ven afectadas por esta vulnerabilidad. Est\u00e1 parcheado en 8.9.13 y 8.19.2. Esta vulnerabilidad de redireccionamiento abierto, con una puntuaci\u00f3n CVSS de 3.1 y un vector CVSS de CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A: N, permite a un atacante no autenticado redirigir a un usuario v\u00edctima al iniciar sesi\u00f3n en Bitbucket Data Center a cualquier sitio arbitrario que pueda utilizarse para una mayor explotaci\u00f3n, lo que tiene un bajo impacto en la confidencialidad, ning\u00fan impacto en la integridad, ning\u00fan impacto en la disponibilidad y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Bitbucket Data Center actualicen a la versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"security@atlassian.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.1,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-601\"}]}],\"references\":[{\"url\":\"https://jira.atlassian.com/browse/BSERV-19454\",\"source\":\"security@atlassian.com\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.