First published: Tue Dec 05 2017(Updated: )
It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bitbucket Auto Unapprove Plugin | =1.0.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.0.0-beta1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.1.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.2.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.2 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.4 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.1.1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.1.3 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.2.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16857 has a high severity rating as it allows attackers to bypass the auto-unapprove functionality and merge unauthorized code.
To fix CVE-2017-16857, upgrade the Atlassian Bitbucket Auto Unapprove Plugin to the latest version available from Atlassian.
CVE-2017-16857 affects all versions of the Atlassian Bitbucket Auto Unapprove Plugin.
CVE-2017-16857 enables attackers to merge any code into repositories without proper approval, potentially leading to unauthorized changes.
There is no widely documented workaround for CVE-2017-16857; the best method is to upgrade to a patched version.