CVE-2022-36804: Bitbucket Server and Data Center command injection vulnerability
On August 24, 2022, Atlassian officially issued a risk notice for Bitbucket Server and Data Center. The vulnerability number is CVE-2022-36804, and the severity is critical. The flaw was found by the security researcher @TheGrandPew and reported via our Bug Bounty program. He has promised to release proof-of-concept code in 30 days.
Bitbucket is a Git-based source code repository hosting service owned by Atlassian. Bitbucket offers both commercial plans and free accounts with an unlimited number of private repositories.
This bug affects Bitbucket Server and Data Center products, and, allows an “attacker with access to a public repository or with read permissions to a private Bitbucket repository can execute arbitrary code by sending a malicious HTTP request.”
CVE-2022-36804 is in multiple API endpoints of Bitbucket Server and Data Center. All versions released after 6.10.17 including 7.0.0 and newer are affected, this means that all instances that are running any versions between 7.0.0 and 8.3.0 inclusive are affected by this vulnerability.
Fixed Versions
Supported Version | Bug Fix Release |
---|---|
Bitbucket Server and Data Center 7.6 | 7.6.17 (LTS) or newer |
Bitbucket Server and Data Center 7.17 | 7.17.10 (LTS) or newer |
Bitbucket Server and Data Center 7.21 | 7.21.4 (LTS) or newer |
Bitbucket Server and Data Center 8.0 | 8.0.3 or newer |
Bitbucket Server and Data Center 8.1 | 8.1.3 or newer |
Bitbucket Server and Data Center 8.2 | 8.2.2 or newer |
Bitbucket Server and Data Center 8.3 | 8.3.1 or newer |
For users who can not temporarily upgrade, Bitbucket gave a temporary mitigation method. A temporary mitigation step is to turn off public repositories globally by setting feature.public.access=false as this will change this attack vector from an unauthorized attack to an authorized attack.