Atlassian.Bitbucket.SDC.CVE-2022-43781.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in Atlassian Bitbucket Server and Data Center.
The vulnerability is due to improper validation of usernames on the server. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution in the security context of the user running the vulnerable application.
Affected Products
Atlassian Bitbucket Server and Data Center 7.0.0 prior to 7.6.19
Atlassian Bitbucket Server and Data Center 7.18.0 prior to 7.21.6
Atlassian Bitbucket Server and Data Center 7.22.0 prior to 8.0.5
Atlassian Bitbucket Server and Data Center 7.7.0 prior to 7.17.12
Atlassian Bitbucket Server and Data Center 8.1.0 prior to 8.1.5
Atlassian Bitbucket Server and Data Center 8.2.0 prior to 8.2.4
Atlassian Bitbucket Server and Data Center 8.3.0 prior to 8.3.3
Atlassian Bitbucket Server and Data Center 8.4.0 prior to 8.4.2
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-security-advisory-2022-11-16-1180141667.html
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |