QID 731002

Date Published: 2023-12-28

QID 731002: Atlassian Bitbucket Server Remote Code Execution (RCE) Vulnerability (BSERV-14528)

In Bitbucket server, SnakeYaml Constructor class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution (CVE-2022-43781).

Affected Versions:
Atlassian Bitbucket Server following versions: 7.17.x,7.18.x,7.19.x,7.20.x,7.21.0,7.21.1,7.21.2,7.21.3,7.21.4,7.21.5,7.21.6,7.21.7,7.21.8,7.21.9,7.21.10,7.21.11,7.21.12,7.21.13,7.21.14,7.21.15,8.0.x,8.1.x,8.2.x,8.3.x,8.4.x,8.5.x,.6.x,8.7.x,8.8.0,8.8.1,8.8.2,8.8.3,8.8.4,8.8.5,8.8.6,8.9.0,8.9.1,8.9.2,8.9.3,8.10.0,8.10.1,8.10.2,8.10.3,8.11.0,8.11.1,8.11.2,8.12.0

Detection Logic:(Unauthenticated)
QID checks for vulnerable versions of Atlassian Bitbucket Server by sending a GET request to /login endpoint.

Successful exploitation of this vulnerability allows remote code execution which may aids further attacks.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The vendor has released fix for this vulnerability. Customers are advised to refer to BSERV-14528 for more information pertaining to this vulnerability, please ref: CVE-2022-1471.
    Vendor References

    CVEs related to QID 731002

    Software Advisories
    Advisory ID Software Component Link
    BSERV-14528 URL Logo jira.atlassian.com/browse/BSERV-14528