what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Bitbucket Path Traversal / Remote Code Execution

Bitbucket Path Traversal / Remote Code Execution
Posted May 23, 2019
Authored by Atlassian

Bitbucket Data Center had a path traversal vulnerability in the Data Center migration tool. A remote attacker with authenticated user with admin permissions can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Bitbucket Data Center. Bitbucket Server versions without a Data Center license are not vulnerable to this vulnerability. Versions of Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) are affected by this vulnerability.

tags | advisory, remote, arbitrary, code execution, file inclusion
advisories | CVE-2019-3397
SHA-256 | eb7fab9f199284bc9dc00a27ebbd15225692c071a07f834c3e67ddca2bd8df05

Bitbucket Path Traversal / Remote Code Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This email refers to the advisory found at
https://confluence.atlassian.com/x/V87JOQ .


CVE ID:

* CVE-2019-3397.


Product: Bitbucket Server.

Affected Bitbucket Server product versions:

5.13.0 <= version < 5.13.5
5.14.0 <= version < 5.14.3
5.15.0 <= version < 5.5.2
6.0.0 <= version < 6.0.3
6.1.0 <= version < 6.1.1


Fixed Bitbucket Server product versions:

* for 5.13.x, Bitbucket Server 5.13.5 has been released with a fix for this
issue.
* for 5.14.x, Bitbucket Server 5.14.3 has been released with a fix for this
issue.
* for 5.15.x, Bitbucket Server 5.5.2 has been released with a fix for this
issue.
* for 6.0.x, Bitbucket Server 6.0.3 has been released with a fix for this
issue.
* for 6.1.x, Bitbucket Server 6.1.1 has been released with a fix for this
issue.


Summary:
This advisory discloses a critical severity security vulnerability. Versions of
Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed version for
5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0
before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed version
for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) are
affected by this vulnerability.



Customers who have upgraded Bitbucket Server to version 5.13.6 or 5.14.4 or
5.15.3 or 6.0.3 or 6.1.2 are not affected.

Customers who have downloaded and installed Bitbucket Server >= 5.13.0 but less
than 5.13.5 (the fixed version for 5.13.x) or who have downloaded and installed
Bitbucket Server >= 5.14.0 but less than 5.14.3 (the fixed version for 5.14.x)
or who have downloaded and installed Bitbucket Server >= 5.15.0 but less than
5.5.2 (the fixed version for 5.15.x) or who have downloaded and installed
Bitbucket Server >= 6.0.0 but less than 6.0.3 (the fixed version for 6.0.x) or
who have downloaded and installed Bitbucket Server >= 6.1.0 but less than 6.1.1
(the fixed version for 6.1.x) please upgrade your Bitbucket Server installations
immediately to fix this vulnerability.



Path traversal in the migration tool RCE (CVE-2019-3397)

Severity:
Atlassian rates the severity level of this vulnerability as critical, according
to the scale published in our Atlassian severity levels. The scale allows us to
rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your own IT
environment.


Description:

Bitbucket Data Center had a path traversal vulnerability in the Data Center
migration tool. A remote attacker with authenticated user with admin permissions
can exploit this path traversal vulnerability to write files to arbitrary
locations which can lead to remote code execution on systems that run a
vulnerable version of Bitbucket Data Center. Bitbucket Server versions without a
Data Center license are not vulnerable to this vulnerability.
Versions of Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed
version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from
5.15.0 before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed
version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x)
are affected by this vulnerability. This issue can be tracked at:
https://jira.atlassian.com/browse/BSERV-11706 .



Fix:

To address this issue, we've released the following versions containing a fix:

* Bitbucket Server version 5.13.6
* Bitbucket Server version 5.14.4
* Bitbucket Server version 5.15.3
* Bitbucket Server version 6.0.3
* Bitbucket Server version 6.1.2

Remediation:

Upgrade Bitbucket Server to version 6.1.2 or higher.

The vulnerabilities and fix versions are described above. If affected, you
should upgrade to the latest version immediately.

If you are running Bitbucket Server 5.13.x and cannot upgrade to 6.1.2, upgrade
to version 5.13.5.
If you are running Bitbucket Server 5.14.x and cannot upgrade to 6.1.2, upgrade
to version 5.14.3.
If you are running Bitbucket Server 5.15.x and cannot upgrade to 6.1.2, upgrade
to version 5.5.2.
If you are running Bitbucket Server 6.0.x and cannot upgrade to 6.1.2, upgrade
to version 6.0.3.


For a full description of the latest version of Bitbucket Server, see
the release notes found at
https://confluence.atlassian.com/display/BitbucketServer/Bitbucket+Server+release+notes.
You can download the latest version of Bitbucket Server from the download centre
found at https://www.atlassian.com/software/bitbucket/download.



Support:
If you have questions or concerns regarding this advisory, please raise a
support request at https://support.atlassian.com/.


-----BEGIN PGP SIGNATURE-----
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=Q8BS
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close