5 results (0.008 seconds)

CVSS: 9.8EPSS: 52%CPEs: 8EXPL: 0

There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”. Existe una vulnerabilidad de inyección de comandos mediante variables de entorno en Bitbucket Server y Data Center. Un atacante con permiso para controlar su nombre de usuario puede aprovechar este problema para ejecutar código arbitrario en el sistema. • https://confluence.atlassian.com/x/Y4hXRg https://jira.atlassian.com/browse/BSERV-13522 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 8.8EPSS: 97%CPEs: 7EXPL: 15

Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew. Múltiples endpoints de la API en Atlassian Bitbucket Server y Data Center 7.0.0 versiones anteriores a 7.6.17, desde versiones 7.7.0 anteriores a 7.17.10, desde versiones 7.18.0 anteriores a 7.21.4, desde versiones 8.0.0 anteriores a 8.0.3, desde versiones 8.1. 0 versiones anteriores a 8.1.3, y desde versiones 8.2.0 anteriores a 8.2.2, y desde versiones 8.3.0 anteriores a 8.3.1, permite a atacantes remotos con permisos de lectura en un repositorio público o privado de Bitbucket ejecutar código arbitrario enviando una petición HTTP maliciosa. Esta vulnerabilidad fue reportada por medio de nuestro programa Bug Bounty por TheGrandPew. Various versions of Bitbucket Server and Data Center are vulnerable to an unauthenticated command injection vulnerability in multiple API endpoints. • https://www.exploit-db.com/exploits/51040 https://github.com/notdls/CVE-2022-36804 https://github.com/notxesh/CVE-2022-36804-PoC https://github.com/benjaminhays/CVE-2022-36804-PoC-Exploit https://github.com/ColdFusionX/CVE-2022-36804 https://github.com/Inplex-sys/CVE-2022-36804 https://github.com/kljunowsky/CVE-2022-36804-POC https://github.com/0xEleven/CVE-2022-36804-ReverseShell https://github.com/khal4n1/CVE-2022-36804 https://github.com/Chocapikk/CVE-2022-36804-Revers •

CVSS: 8.8EPSS: 0%CPEs: 42EXPL: 0

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to cause additional Servlet Filters to be invoked when the application processes requests or responses. Atlassian has confirmed and fixed the only known security issue associated with this vulnerability: Cross-origin resource sharing (CORS) bypass. Sending a specially crafted HTTP request can invoke the Servlet Filter used to respond to CORS requests, resulting in a CORS bypass. An attacker that can trick a user into requesting a malicious URL can access the vulnerable application with the victim’s permissions. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. • https://jira.atlassian.com/browse/BAM-21795 https://jira.atlassian.com/browse/BSERV-13370 https://jira.atlassian.com/browse/CONFSERVER-79476 https://jira.atlassian.com/browse/CRUC-8541 https://jira.atlassian.com/browse/CWD-5815 https://jira.atlassian.com/browse/FE-7410 https://jira.atlassian.com/browse/JRASERVER-73897 https://jira.atlassian.com/browse/JSDSERVER-11863 • CWE-180: Incorrect Behavior Order: Validate Before Canonicalize CWE-346: Origin Validation Error •

CVSS: 9.8EPSS: 0%CPEs: 42EXPL: 0

A vulnerability in multiple Atlassian products allows a remote, unauthenticated attacker to bypass Servlet Filters used by first and third party apps. The impact depends on which filters are used by each app, and how the filters are used. This vulnerability can result in authentication bypass and cross-site scripting. Atlassian has released updates that fix the root cause of this vulnerability, but has not exhaustively enumerated all potential consequences of this vulnerability. Atlassian Bamboo versions are affected before 8.0.9, from 8.1.0 before 8.1.8, and from 8.2.0 before 8.2.4. • https://jira.atlassian.com/browse/BAM-21795 https://jira.atlassian.com/browse/BSERV-13370 https://jira.atlassian.com/browse/CONFSERVER-79476 https://jira.atlassian.com/browse/CRUC-8541 https://jira.atlassian.com/browse/CWD-5815 https://jira.atlassian.com/browse/FE-7410 https://jira.atlassian.com/browse/JRASERVER-73897 https://jira.atlassian.com/browse/JSDSERVER-11863 • CWE-180: Incorrect Behavior Order: Validate Before Canonicalize CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

The Microsoft Windows Installer for Atlassian Bitbucket Server and Data Center before version 6.10.9, 7.x before 7.6.4, and from version 7.7.0 before 7.10.1 allows local attackers to escalate privileges because of weak permissions on the installation directory. El Microsoft Windows Installer para Atlassian Bitbucket Server y Data Center versiones anteriores a 6.10.9, versiones 7.x anteriores a 7.6.4 y desde versión 7.7.0 versiones anteriores a 7.10.1, permite a los atacantes locales escalar privilegios debido a permisos débiles en el directorio de instalación • https://jira.atlassian.com/browse/BSERV-12753 https://www.kb.cert.org/vuls/id/240785 • CWE-276: Incorrect Default Permissions •