14 results (0.017 seconds)

CVSS: 8.8EPSS: 0%CPEs: 42EXPL: 0

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. • https://jira.atlassian.com/browse/BAM-21795 https://jira.atlassian.com/browse/BSERV-13370 https://jira.atlassian.com/browse/CONFSERVER-79476 https://jira.atlassian.com/browse/CRUC-8541 https://jira.atlassian.com/browse/CWD-5815 https://jira.atlassian.com/browse/FE-7410 https://jira.atlassian.com/browse/JRASERVER-73897 https://jira.atlassian.com/browse/JSDSERVER-11863 • CWE-180: Incorrect Behavior Order: Validate Before Canonicalize CWE-346: Origin Validation Error •

CVSS: 9.8EPSS: 0%CPEs: 42EXPL: 0

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. • https://jira.atlassian.com/browse/BAM-21795 https://jira.atlassian.com/browse/BSERV-13370 https://jira.atlassian.com/browse/CONFSERVER-79476 https://jira.atlassian.com/browse/CRUC-8541 https://jira.atlassian.com/browse/CWD-5815 https://jira.atlassian.com/browse/FE-7410 https://jira.atlassian.com/browse/JRASERVER-73897 https://jira.atlassian.com/browse/JSDSERVER-11863 • CWE-180: Incorrect Behavior Order: Validate Before Canonicalize CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory. El Microsoft Windows Installer para Atlassian Bitbucket Server y Data Center versiones anteriores a 6.10.9, versiones 7.x anteriores a 7.6.4 y desde versión 7.7.0 versiones anteriores a 7.10.1, permite a los atacantes locales escalar privilegios debido a permisos débiles en el directorio de instalación • https://jira.atlassian.com/browse/BSERV-12753 https://www.kb.cert.org/vuls/id/240785 • CWE-276: Incorrect Default Permissions •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Atlassian Bitbucket Server from version 4.9.0 before version 7.2.4 allows remote attackers to intercept unencrypted repository import requests via a Man-in-the-Middle (MITM) attack. Atlassian Bitbucket Server desde la versión 4.9.0 anterior a la versión 7.2.4, permite a atacantes remotos interceptar peticiones de importación de repositorios sin cifrar mediante un ataque Man-in-the-Middle (MITM) • https://jira.atlassian.com/browse/BSERV-12434 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 8.8EPSS: 0%CPEs: 11EXPL: 0

Bitbucket Server and Bitbucket Data Center versions starting from 1.0.0 before 5.16.11, from version 6.0.0 before 6.0.11, from version 6.1.0 before 6.1.9, from version 6.2.0 before 6.2.7, from version 6.3.0 before 6.3.6, from version 6.4.0 before 6.4.4, from version 6.5.0 before 6.5.3, from version 6.6.0 before 6.6.3, from version 6.7.0 before 6.7.3, from version 6.8.0 before 6.8.2, from version 6.9.0 before 6.9.1 had a Remote Code Execution vulnerability via the post-receive hook. A remote attacker with permission to clone and push files to a repository on the victim's Bitbucket Server or Bitbucket Data Center instance, can exploit this vulnerability to execute arbitrary commands on the Bitbucket Server or Bitbucket Data Center systems, using a file with specially crafted content. Bitbucket Server y Bitbucket Data Center versiones comenzando desde 1.0.0 anteriores a la versión 5.16.11, desde versión 6.0.0 anteriores a la versión 6.0.11, desde versión 6.1.0 anteriores a la versión 6.1.9, desde versión 6.2.0 anteriores a la versión 6.2.7, desde versión 6.3 .0 anteriores a la versión 6.3.6, desde versión 6.4.0 anteriores a la versión 6.4.4, desde versión 6.5.0 anteriores a 6.5.3, desde versión 6.6.0 anteriores a 6.6.3, desde versión 6.7.0 anteriores a la versión 6.7.3, desde versión 6.8 .0 anteriores a la versión 6.8.2, desde versión 6.9.0 anteriores a la versión 6.9.1, tiene una vulnerabilidad de Ejecución de Código Remota por medio del enlace post-receive. Un atacante remoto con permiso para clonar y colocar archivos a un repositorio en la instancia de Bitbucket Server o Bitbucket Data Center de la víctima, puede explotar esta vulnerabilidad para ejecutar comandos arbitrarios en los sistemas Bitbucket Server o Bitbucket Data Center, utilizando un archivo con contenido especialmente diseñado. • https://jira.atlassian.com/browse/BSERV-12099 •