CWE
78
Advisory Published
Updated

CVE-2019-15000: OS Command Injection

First published: Thu Sep 19 2019(Updated: )

The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands.

Credit: security@atlassian.com

Affected SoftwareAffected VersionHow to fix
Atlassian Bitbucket>=5.16.0<5.16.10
Atlassian Bitbucket>=6.0.0<6.0.10
Atlassian Bitbucket>=6.1.0<6.1.8
Atlassian Bitbucket>=6.2.0<6.2.6
Atlassian Bitbucket>=6.3.0<6.3.5
Atlassian Bitbucket>=6.4.0<6.4.3
Atlassian Bitbucket>=6.5.0<6.5.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-15000?

    CVE-2019-15000 is a vulnerability in Bitbucket Server and Data Center versions before 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, and 6.5.2 that allows for argument injection.

  • What is the severity of CVE-2019-15000?

    The severity of CVE-2019-15000 is critical with a CVSS score of 9.8.

  • How does CVE-2019-15000 affect Atlassian Bitbucket?

    CVE-2019-15000 affects Atlassian Bitbucket versions before 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, and 6.5.2.

  • How can I fix CVE-2019-15000?

    To fix CVE-2019-15000, you should upgrade Bitbucket Server and Data Center to versions 5.16.10, 6.0.10, 6.1.8, 6.2.6, 6.3.5, 6.4.3, or 6.5.2, which contain the fix for this vulnerability.

  • Where can I find more information about CVE-2019-15000?

    You can find more information about CVE-2019-15000 at the following references: [CVE-2019-15000](http://packetstormsecurity.com/files/154610/Bitbucket-Server-Data-Center-Argument-Injection.html), [Jira ticket BSERV-11947](https://jira.atlassian.com/browse/BSERV-11947), and [seclists.org](https://seclists.org/bugtraq/2019/Sep/43).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203