First published: Tue Dec 05 2017(Updated: )
It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bitbucket Auto Unapprove Plugin | =1.0.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.0.0-beta1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.1.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =1.2.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.2 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.0.4 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.1.1 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.1.3 | |
Atlassian Bitbucket Auto Unapprove Plugin | =2.2.0 | |
Atlassian Bitbucket Auto Unapprove Plugin | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.