There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
References
Link | Resource |
---|---|
https://confluence.atlassian.com/x/Y4hXRg | Mitigation Release Notes Vendor Advisory |
https://jira.atlassian.com/browse/BSERV-13522 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Nov 2022, 18:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-17 00:15
Updated : 2024-10-02 15:35
NVD link : CVE-2022-43781
Mitre link : CVE-2022-43781
CVE.ORG link : CVE-2022-43781
JSON object : View
Products Affected
atlassian
- bitbucket
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')