CVE-2019-3397 (GCVE-0-2019-3397)

Vulnerability from cvelistv5 – Published: 2019-06-03 13:44 – Updated: 2024-09-16 17:47
VLAI?
Summary
Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.
Severity ?
No CVSS data available.
CWE
  • Path Traversal
Assigner
References
Impacted products
Vendor Product Version
Atlassian Bitbucket Data Center Affected: 5.13.0 , < unspecified (custom)
Affected: unspecified , < 5.13.6 (custom)
Affected: 5.14.0 , < unspecified (custom)
Affected: unspecified , < 5.14.4 (custom)
Affected: 5.15.0 , < unspecified (custom)
Affected: unspecified , < 5.15.3 (custom)
Affected: 6.0.0 , < unspecified (custom)
Affected: unspecified , < 6.0.3 (custom)
Affected: 6.1.0 , < unspecified (custom)
Affected: unspecified , < 6.1.2 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:12:09.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jira.atlassian.com/browse/BSERV-11706"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Bitbucket Data Center",
          "vendor": "Atlassian",
          "versions": [
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "5.13.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.6",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "5.14.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.14.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "5.15.0",
              "versionType": "custom"
            },
            {
              "lessThan": "5.15.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.0.3",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "affected",
              "version": "6.1.0",
              "versionType": "custom"
            },
            {
              "lessThan": "6.1.2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-05-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Path Traversal",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-03T13:44:05",
        "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
        "shortName": "atlassian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jira.atlassian.com/browse/BSERV-11706"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@atlassian.com",
          "DATE_PUBLIC": "2019-05-22T10:00:00",
          "ID": "CVE-2019-3397",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Bitbucket Data Center",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003e=",
                            "version_value": "5.13.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "5.13.6"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "5.14.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "5.14.4"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "5.15.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "5.15.3"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "6.0.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "6.0.3"
                          },
                          {
                            "version_affected": "\u003e=",
                            "version_value": "6.1.0"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_value": "6.1.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Atlassian"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Path Traversal"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://jira.atlassian.com/browse/BSERV-11706",
              "refsource": "MISC",
              "url": "https://jira.atlassian.com/browse/BSERV-11706"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66",
    "assignerShortName": "atlassian",
    "cveId": "CVE-2019-3397",
    "datePublished": "2019-06-03T13:44:05.862975Z",
    "dateReserved": "2018-12-19T00:00:00",
    "dateUpdated": "2024-09-16T17:47:59.258Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.13.0\", \"versionEndExcluding\": \"5.13.6\", \"matchCriteriaId\": \"A6215D87-F4E1-445C-B201-89F411229CA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.14.0\", \"versionEndExcluding\": \"5.14.4\", \"matchCriteriaId\": \"6EFC24FA-DFFB-45B6-8F63-3AFDE1CC5464\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.15.0\", \"versionEndExcluding\": \"5.15.3\", \"matchCriteriaId\": \"6FD74B56-390D-48CB-93BB-0452869D58D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16.0\", \"versionEndExcluding\": \"5.16.3\", \"matchCriteriaId\": \"0F6EA7D6-40E5-4F3D-B5C4-16DB7AB421A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.0.0\", \"versionEndExcluding\": \"6.0.3\", \"matchCriteriaId\": \"1D61084D-DA80-4EAD-AABA-DD94F9A69475\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.1.0\", \"versionEndExcluding\": \"6.1.2\", \"matchCriteriaId\": \"9E69F799-F16F-4C25-AE84-5D73CBEAD71D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.\"}, {\"lang\": \"es\", \"value\": \"Atlassian Bitbucket Data Center con licencias que comienzan con la versi\\u00f3n 5.13.0 anterior a la 5.13.6 (la versi\\u00f3n fija para 5.13.x), desde la versi\\u00f3n 5.14.0 anterior a la 5.14.4 (versi\\u00f3n fija para la 5.14.x), desde la versi\\u00f3n 5.15.0 hasta la 5.15. 3 (versi\\u00f3n fija para 5.15.x), de versi\\u00f3n 5.16.0 anterior a 5.16.3 (versi\\u00f3n fija de 5.16.x), desde versi\\u00f3n 6.0.0 anterior a 6.0.3 (versi\\u00f3n fija para 6.0.x), y desde versi\\u00f3n 6.1.0 anterior a 6.1.2 (la versi\\u00f3n fija para 6.1.x), permite a los atacanterior remotos con permisos de administrador lograr la ejecuci\\u00f3n de c\\u00f3digo remota en una instancia del servidor Bitbucket por medio de un salto de path (path trasversal) de la herramienta de migraci\\u00f3n del Centro de Datos.\"}]",
      "id": "CVE-2019-3397",
      "lastModified": "2024-11-21T04:42:01.703",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-06-03T14:29:00.293",
      "references": "[{\"url\": \"https://jira.atlassian.com/browse/BSERV-11706\", \"source\": \"security@atlassian.com\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}, {\"url\": \"https://jira.atlassian.com/browse/BSERV-11706\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@atlassian.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-3397\",\"sourceIdentifier\":\"security@atlassian.com\",\"published\":\"2019-06-03T14:29:00.293\",\"lastModified\":\"2024-11-21T04:42:01.703\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool.\"},{\"lang\":\"es\",\"value\":\"Atlassian Bitbucket Data Center con licencias que comienzan con la versi\u00f3n 5.13.0 anterior a la 5.13.6 (la versi\u00f3n fija para 5.13.x), desde la versi\u00f3n 5.14.0 anterior a la 5.14.4 (versi\u00f3n fija para la 5.14.x), desde la versi\u00f3n 5.15.0 hasta la 5.15. 3 (versi\u00f3n fija para 5.15.x), de versi\u00f3n 5.16.0 anterior a 5.16.3 (versi\u00f3n fija de 5.16.x), desde versi\u00f3n 6.0.0 anterior a 6.0.3 (versi\u00f3n fija para 6.0.x), y desde versi\u00f3n 6.1.0 anterior a 6.1.2 (la versi\u00f3n fija para 6.1.x), permite a los atacanterior remotos con permisos de administrador lograr la ejecuci\u00f3n de c\u00f3digo remota en una instancia del servidor Bitbucket por medio de un salto de path (path trasversal) de la herramienta de migraci\u00f3n del Centro de Datos.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.13.0\",\"versionEndExcluding\":\"5.13.6\",\"matchCriteriaId\":\"A6215D87-F4E1-445C-B201-89F411229CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.14.0\",\"versionEndExcluding\":\"5.14.4\",\"matchCriteriaId\":\"6EFC24FA-DFFB-45B6-8F63-3AFDE1CC5464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.0\",\"versionEndExcluding\":\"5.15.3\",\"matchCriteriaId\":\"6FD74B56-390D-48CB-93BB-0452869D58D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16.0\",\"versionEndExcluding\":\"5.16.3\",\"matchCriteriaId\":\"0F6EA7D6-40E5-4F3D-B5C4-16DB7AB421A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.0.3\",\"matchCriteriaId\":\"1D61084D-DA80-4EAD-AABA-DD94F9A69475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.0\",\"versionEndExcluding\":\"6.1.2\",\"matchCriteriaId\":\"9E69F799-F16F-4C25-AE84-5D73CBEAD71D\"}]}]}],\"references\":[{\"url\":\"https://jira.atlassian.com/browse/BSERV-11706\",\"source\":\"security@atlassian.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://jira.atlassian.com/browse/BSERV-11706\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…