CVE-2018-5225
Summary
| CVE | CVE-2018-5225 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-22 13:29:00 UTC |
| Updated | 2018-04-20 16:57:00 UTC |
| Description | In browser editing in Atlassian Bitbucket Server from version 4.13.0 before 5.4.8 (the fixed version for 4.13.0 through 5.4.7), 5.5.0 before 5.5.8 (the fixed version for 5.5.x), 5.6.0 before 5.6.5 (the fixed version for 5.6.x), 5.7.0 before 5.7.3 (the fixed version for 5.7.x), and 5.8.0 before 5.8.2 (the fixed version for 5.8.x), allows authenticated users to gain remote code execution using the in browser editing feature via editing a symbolic link within a repository. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [BSERV-10684] Remote Code Execution via in Browser Editing - CVE-2018-5225 - Create and track feature requests for Atlassian products. | CONFIRM | jira.atlassian.com | Vendor Advisory |
| Atlassian Bitbucket Server CVE-2018-5225 Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Bitbucket Server security advisory 2018-03-21 | Bitbucket Data Center and Server 7.8 | Atlassian Documentation | CONFIRM | confluence.atlassian.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.