First published: Thu Sep 19 2019(Updated: )
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands.
Credit: security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bitbucket | >=5.16.0<5.16.10 | |
Atlassian Bitbucket | >=6.0.0<6.0.10 | |
Atlassian Bitbucket | >=6.1.0<6.1.8 | |
Atlassian Bitbucket | >=6.2.0<6.2.6 | |
Atlassian Bitbucket | >=6.3.0<6.3.5 | |
Atlassian Bitbucket | >=6.4.0<6.4.3 | |
Atlassian Bitbucket | >=6.5.0<6.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15000 is a vulnerability in Bitbucket Server and Data Center versions before 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, and 6.5.2 that allows for argument injection.
The severity of CVE-2019-15000 is critical with a CVSS score of 9.8.
CVE-2019-15000 affects Atlassian Bitbucket versions before 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, and 6.5.2.
To fix CVE-2019-15000, you should upgrade Bitbucket Server and Data Center to versions 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, or 6.5.2, which contain the fix for this vulnerability.
You can find more information about CVE-2019-15000 at the following references: [CVE-2019-15000](http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html), [Jira ticket BSERV-11947](https://jira.atlassian.com/browse/BSERV-11947), and [seclists.org](https://seclists.org/bugtraq/2019/Sep/43).