CVE-2018-5225 (GCVE-0-2018-5225)
Vulnerability from cvelistv5 – Published: 2018-03-22 13:00 – Updated: 2024-09-16 18:49
VLAI?
Summary
In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Atlassian | Bitbucket Server |
Affected:
4.13.0 , < unspecified
(custom)
Affected: unspecified , < 5.4.8 (custom) Affected: 5.5.0 , < unspecified (custom) Affected: unspecified , < 5.5.8 (custom) Affected: 5.6.0 , < unspecified (custom) Affected: unspecified , < 5.6.5 (custom) Affected: 5.7.0 , < unspecified (custom) Affected: unspecified , < 5.7.3 (custom) Affected: 5.8.0 , < unspecified (custom) Affected: unspecified , < 5.8.2 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:42.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://jira.atlassian.com/browse/BSERV-10684"
},
{
"name": "103488",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103488"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://confluence.atlassian.com/x/3WNsO"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Bitbucket Server",
"vendor": "Atlassian",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "4.13.0",
"versionType": "custom"
},
{
"lessThan": "5.4.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "5.5.0",
"versionType": "custom"
},
{
"lessThan": "5.5.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "5.6.0",
"versionType": "custom"
},
{
"lessThan": "5.6.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "5.7.0",
"versionType": "custom"
},
{
"lessThan": "5.7.3",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "unspecified",
"status": "affected",
"version": "5.8.0",
"versionType": "custom"
},
{
"lessThan": "5.8.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2018-03-22T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-03-26T20:57:01",
"orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
"shortName": "atlassian"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://jira.atlassian.com/browse/BSERV-10684"
},
{
"name": "103488",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103488"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://confluence.atlassian.com/x/3WNsO"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@atlassian.com",
"DATE_PUBLIC": "2018-03-22T10:00:00",
"ID": "CVE-2018-5225",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Bitbucket Server",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_value": "4.13.0"
},
{
"version_affected": "\u003c",
"version_value": "5.4.8"
},
{
"version_affected": "\u003e=",
"version_value": "5.5.0"
},
{
"version_affected": "\u003c",
"version_value": "5.5.8"
},
{
"version_affected": "\u003e=",
"version_value": "5.6.0"
},
{
"version_affected": "\u003c",
"version_value": "5.6.5"
},
{
"version_affected": "\u003e=",
"version_value": "5.7.0"
},
{
"version_affected": "\u003c",
"version_value": "5.7.3"
},
{
"version_affected": "\u003e=",
"version_value": "5.8.0"
},
{
"version_affected": "\u003c",
"version_value": "5.8.2"
}
]
}
}
]
},
"vendor_name": "Atlassian"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://jira.atlassian.com/browse/BSERV-10684",
"refsource": "CONFIRM",
"url": "https://jira.atlassian.com/browse/BSERV-10684"
},
{
"name": "103488",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103488"
},
{
"name": "https://confluence.atlassian.com/x/3WNsO",
"refsource": "CONFIRM",
"url": "https://confluence.atlassian.com/x/3WNsO"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
"assignerShortName": "atlassian",
"cveId": "CVE-2018-5225",
"datePublished": "2018-03-22T13:00:00Z",
"dateReserved": "2018-01-05T00:00:00",
"dateUpdated": "2024-09-16T18:49:04.214Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.13.0\", \"versionEndExcluding\": \"5.4.8\", \"matchCriteriaId\": \"DBD82B36-AC2E-4658-AF54-08AD80ADC204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartExcluding\": \"5.5.0\", \"versionEndExcluding\": \"5.5.8\", \"matchCriteriaId\": \"5851BBBD-A981-4EDF-908D-26777D56BC28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.6.0\", \"versionEndExcluding\": \"5.6.5\", \"matchCriteriaId\": \"C297270E-797B-41F7-8C38-6CBE70F5F576\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.7.0\", \"versionEndExcluding\": \"5.7.3\", \"matchCriteriaId\": \"DEEE37C3-D9F9-45C6-BB6F-FF1D4BDC7753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.8.0\", \"versionEndExcluding\": \"5.8.2\", \"matchCriteriaId\": \"B61465FD-C06C-48A7-BF01-5AAA5C690546\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.\"}, {\"lang\": \"es\", \"value\": \"La edici\\u00f3n en navegador de Atlassian Bitbucket Server, en versiones 4.13.0 anteriores a la 5.4.8 (la versi\\u00f3n solucionada de la versi\\u00f3n 4.13.0 hasta la 5.4.7), versiones 5.5.0 anteriores a la 5.5.8 (la versi\\u00f3n solucionada de las versiones 5.5.x), versiones 5.6.0 anteriores a la 5.6.5 (la versi\\u00f3n solucionada de las versiones 5.6.x), versiones 5.7.0 anteriores a la 5.7.3 (la versi\\u00f3n solucionada de las versiones 5.7.x) y versiones 5.8.0 anteriores a la 5.8.2 (la versi\\u00f3n solucionada para 5.8.x), permite que usuarios autenticados obtengan ejecuci\\u00f3n remota de c\\u00f3digo mediante la caracter\\u00edstica de edici\\u00f3n en navegador editando un enlace simb\\u00f3lico en un repositorio.\"}]",
"id": "CVE-2018-5225",
"lastModified": "2024-11-21T04:08:22.477",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.9, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.1, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:P\", \"baseScore\": 6.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-03-22T13:29:00.810",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/103488\", \"source\": \"security@atlassian.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://confluence.atlassian.com/x/3WNsO\", \"source\": \"security@atlassian.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/BSERV-10684\", \"source\": \"security@atlassian.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/103488\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://confluence.atlassian.com/x/3WNsO\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/BSERV-10684\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@atlassian.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-59\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-5225\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2018-03-22T13:29:00.810\",\"lastModified\":\"2024-11-21T04:08:22.477\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository.\"},{\"lang\":\"es\",\"value\":\"La edici\u00f3n en navegador de Atlassian Bitbucket Server, en versiones 4.13.0 anteriores a la 5.4.8 (la versi\u00f3n solucionada de la versi\u00f3n 4.13.0 hasta la 5.4.7), versiones 5.5.0 anteriores a la 5.5.8 (la versi\u00f3n solucionada de las versiones 5.5.x), versiones 5.6.0 anteriores a la 5.6.5 (la versi\u00f3n solucionada de las versiones 5.6.x), versiones 5.7.0 anteriores a la 5.7.3 (la versi\u00f3n solucionada de las versiones 5.7.x) y versiones 5.8.0 anteriores a la 5.8.2 (la versi\u00f3n solucionada para 5.8.x), permite que usuarios autenticados obtengan ejecuci\u00f3n remota de c\u00f3digo mediante la caracter\u00edstica de edici\u00f3n en navegador editando un enlace simb\u00f3lico en un repositorio.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.13.0\",\"versionEndExcluding\":\"5.4.8\",\"matchCriteriaId\":\"DBD82B36-AC2E-4658-AF54-08AD80ADC204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"5.5.0\",\"versionEndExcluding\":\"5.5.8\",\"matchCriteriaId\":\"5851BBBD-A981-4EDF-908D-26777D56BC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.6.0\",\"versionEndExcluding\":\"5.6.5\",\"matchCriteriaId\":\"C297270E-797B-41F7-8C38-6CBE70F5F576\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7.0\",\"versionEndExcluding\":\"5.7.3\",\"matchCriteriaId\":\"DEEE37C3-D9F9-45C6-BB6F-FF1D4BDC7753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.8.0\",\"versionEndExcluding\":\"5.8.2\",\"matchCriteriaId\":\"B61465FD-C06C-48A7-BF01-5AAA5C690546\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103488\",\"source\":\"security@atlassian.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/x/3WNsO\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/BSERV-10684\",\"source\":\"security@atlassian.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://confluence.atlassian.com/x/3WNsO\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/BSERV-10684\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…