Saturday, November 23, 2024

Patch critical flaw in Atlassian Bitbucket Server and Data Center! (CVE-2022-36804)

A critical vulnerability in Atlassian Bitbucket Server and Data Center (CVE-2022-36804) could be exploited by unauthorized attackers to execute malicious code on vulnerable instances.3

About CVE-2022-36804

Bitbucket Server and Data Center are used by software developers around the world for source code revision control, management and hosting.

CVE-2022-36804 is a command injection vulnerability in multiple API endpoints of Bitbucket Server and Data Center.

“An attacker with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request,” Atlassian explained. Which subsequent actions the attacker can take depends on the permissions associated with the exploited application.

All versions of Bitbucket Server and Data Center released before versions 7.6.17, 7.17.10, 7.21.4, 8.0.3, 8.1.2, 8.2.2, and 8.3.1 are vulnerable, but Bitbucket installations hosted by Atlassian are not affected.

Fixing the issue before attackers start exploiting it

Users are advised to upgrade to their self-hosted installations to plug the security hole.

“If you have configured Bitbucket Mesh nodes, these will need to be updated with to the corresponding version of Mesh that includes the fix,” the company added.

“If you’re unable to upgrade Bitbucket, a temporary mitigation step is to turn off public repositories globally by setting feature.public.access=false as this will change this attack vector from an unauthorized attack to an authorized attack. This can not be considered complete mitigation as an attacker with a user account could still succeed.”

CVE-2022-36804 was reported by AppSec auditor Maxwell Garret (aka TheGrandPew), who recently promised to release a PoC in late September.

Recommended:  VULN: Urgent Chrome Update Patche's New Zero-Day Vulnerability

Of course, nothing’s stopping attackers from reverse-engineering the provided patches to glean enough information into the flaw to create a working exploit, so users should act quickly to counter this avenue of attack.

source

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose
Share the word, let's increase Cybersecurity Awareness as we know it
- Sponsored -

Sponsored Offer

Unleash the Power of the Cloud: Grab $200 Credit for 60 Days on DigitalOcean!

Digital ocean free 200

Discover more infosec

RiSec.Mitch
Just your average information security researcher from Delaware US.

more infosec reads

Subscribe for weekly updates

explore

more

security