exploit the possibilities

Bitbucket Path Traversal / Remote Code Execution

Bitbucket Path Traversal / Remote Code Execution
Posted May 23, 2019
Authored by Atlassian

Bitbucket Data Center had a path traversal vulnerability in the Data Center migration tool. A remote attacker with authenticated user with admin permissions can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Bitbucket Data Center. Bitbucket Server versions without a Data Center license are not vulnerable to this vulnerability. Versions of Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) are affected by this vulnerability.

tags | advisory, remote, arbitrary, code execution, file inclusion
advisories | CVE-2019-3397
MD5 | 657e273aa3e0e9c381f5de0e31630a90

Bitbucket Path Traversal / Remote Code Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

This email refers to the advisory found at
https://confluence.atlassian.com/x/V87JOQ .


CVE ID:

* CVE-2019-3397.


Product: Bitbucket Server.

Affected Bitbucket Server product versions:

5.13.0 <= version < 5.13.5
5.14.0 <= version < 5.14.3
5.15.0 <= version < 5.5.2
6.0.0 <= version < 6.0.3
6.1.0 <= version < 6.1.1


Fixed Bitbucket Server product versions:

* for 5.13.x, Bitbucket Server 5.13.5 has been released with a fix for this
issue.
* for 5.14.x, Bitbucket Server 5.14.3 has been released with a fix for this
issue.
* for 5.15.x, Bitbucket Server 5.5.2 has been released with a fix for this
issue.
* for 6.0.x, Bitbucket Server 6.0.3 has been released with a fix for this
issue.
* for 6.1.x, Bitbucket Server 6.1.1 has been released with a fix for this
issue.


Summary:
This advisory discloses a critical severity security vulnerability. Versions of
Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed version for
5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0
before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed version
for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) are
affected by this vulnerability.



Customers who have upgraded Bitbucket Server to version 5.13.6 or 5.14.4 or
5.15.3 or 6.0.3 or 6.1.2 are not affected.

Customers who have downloaded and installed Bitbucket Server >= 5.13.0 but less
than 5.13.5 (the fixed version for 5.13.x) or who have downloaded and installed
Bitbucket Server >= 5.14.0 but less than 5.14.3 (the fixed version for 5.14.x)
or who have downloaded and installed Bitbucket Server >= 5.15.0 but less than
5.5.2 (the fixed version for 5.15.x) or who have downloaded and installed
Bitbucket Server >= 6.0.0 but less than 6.0.3 (the fixed version for 6.0.x) or
who have downloaded and installed Bitbucket Server >= 6.1.0 but less than 6.1.1
(the fixed version for 6.1.x) please upgrade your Bitbucket Server installations
immediately to fix this vulnerability.



Path traversal in the migration tool RCE (CVE-2019-3397)

Severity:
Atlassian rates the severity level of this vulnerability as critical, according
to the scale published in our Atlassian severity levels. The scale allows us to
rank the severity as critical, high, moderate or low.
This is our assessment and you should evaluate its applicability to your own IT
environment.


Description:

Bitbucket Data Center had a path traversal vulnerability in the Data Center
migration tool. A remote attacker with authenticated user with admin permissions
can exploit this path traversal vulnerability to write files to arbitrary
locations which can lead to remote code execution on systems that run a
vulnerable version of Bitbucket Data Center. Bitbucket Server versions without a
Data Center license are not vulnerable to this vulnerability.
Versions of Bitbucket Server starting with 5.13.0 before 5.13.6 (the fixed
version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from
5.15.0 before 5.15.3 (fixed version for 5.13.x), from 6.0.0 before 6.0.3 (fixed
version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x)
are affected by this vulnerability. This issue can be tracked at:
https://jira.atlassian.com/browse/BSERV-11706 .



Fix:

To address this issue, we've released the following versions containing a fix:

* Bitbucket Server version 5.13.6
* Bitbucket Server version 5.14.4
* Bitbucket Server version 5.15.3
* Bitbucket Server version 6.0.3
* Bitbucket Server version 6.1.2

Remediation:

Upgrade Bitbucket Server to version 6.1.2 or higher.

The vulnerabilities and fix versions are described above. If affected, you
should upgrade to the latest version immediately.

If you are running Bitbucket Server 5.13.x and cannot upgrade to 6.1.2, upgrade
to version 5.13.5.
If you are running Bitbucket Server 5.14.x and cannot upgrade to 6.1.2, upgrade
to version 5.14.3.
If you are running Bitbucket Server 5.15.x and cannot upgrade to 6.1.2, upgrade
to version 5.5.2.
If you are running Bitbucket Server 6.0.x and cannot upgrade to 6.1.2, upgrade
to version 6.0.3.


For a full description of the latest version of Bitbucket Server, see
the release notes found at
https://confluence.atlassian.com/display/BitbucketServer/Bitbucket+Server+release+notes.
You can download the latest version of Bitbucket Server from the download centre
found at https://www.atlassian.com/software/bitbucket/download.



Support:
If you have questions or concerns regarding this advisory, please raise a
support request at https://support.atlassian.com/.


-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEXh3qw5vbMx/VSutRJCCXorxSdqAFAlzl3DEACgkQJCCXorxS
dqCoZQ/+NGRDr27asjsEg1d9ft2qC/hl+0B2jFaOg3rJoZYBUyPJUNL59pgayu2x
99/NleRCU12VNK4xenhQGHPwbDXfvAh7eSuWksc0q+gN9VudqVZhnKNKZKajn9H3
pfESjk8e2sEVUEtHOKX4RjYd95VrTwFQdVagyu8fUSkHfQa1DU3sEmYqO67ySH6d
R6pxSaEQVhpQgFkZrTYPaHoainIW40lPS9z/1E6C67DVdBElzINKbqr+yVilxJC0
QeUS/aLlAyq5L9sxu0nlLBYw7d+gPaq7GKobT17YtrHnV4kw93mYWWokVZ0q2j8w
Hg+RaNdFhXcYIeSYyKQLbqOKsVNDmLB6/iy+ndtC8wVEOQMgwuSu8FW7pNBpuM9N
CzlLjvtTyLJQYkCc2f3BRsuMUuPuUBSGqjyjrbDO820Q4r9Rm411aS1ANueYrLaP
3thEdpxYgqqU+eaHWdqPDlKYRAPHWUQ6r+W1JJl1tdHyJg5hUVNGFOb9bRpAwiwD
Ndwif9o1zmzt7q9CkTQMbZbPiD7O2S8BqPqdrShuN/Vtkvi6gvL6fi5lQDdE4ws7
1suqiIdYAKgC8/bAS7lIEXU1QCTN0clo6/AU92TqF8wm0yYfDNs/ezy4wU/Otqxd
2pyFfGcyaCqVa9lBoZ0K8CXD9wu3nXd3Rod13cG13YRppMfw8AM=
=Q8BS
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    2 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    18 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    22 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    2 Files
  • 23
    Jun 23rd
    1 Files
  • 24
    Jun 24th
    23 Files
  • 25
    Jun 25th
    19 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close