CVE-2022-43781

There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
References
Link Resource
https://confluence.atlassian.com/x/Y4hXRg Mitigation Release Notes Vendor Advisory
https://jira.atlassian.com/browse/BSERV-13522 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*

History

18 Nov 2022, 18:51

Type Values Removed Values Added
CWE CWE-77
CPE cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://jira.atlassian.com/browse/BSERV-13522 - (MISC) https://jira.atlassian.com/browse/BSERV-13522 - Issue Tracking, Patch, Vendor Advisory
References (MISC) https://confluence.atlassian.com/x/Y4hXRg - (MISC) https://confluence.atlassian.com/x/Y4hXRg - Mitigation, Release Notes, Vendor Advisory
First Time Atlassian
Atlassian bitbucket

17 Nov 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-17 00:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-43781

Mitre link : CVE-2022-43781

CVE.ORG link : CVE-2022-43781


JSON object : View

Products Affected

atlassian

  • bitbucket
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')