First published: Wed Apr 20 2022(Updated: )
SharedSecretClusterAuthenticator in Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0 allow a remote, unauthenticated attacker to execute arbitrary code via Java deserialization.
Credit: security@atlassian.com security@atlassian.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atlassian Bitbucket Data Center | >=5.14.0<7.6.14 | |
Atlassian Bitbucket Data Center | >=7.7.0<7.17.6 | |
Atlassian Bitbucket Data Center | >=7.18.0<7.18.4 | |
Atlassian Bitbucket Data Center | >=7.19.0<7.19.4 | |
Atlassian Bitbucket Data Center | =7.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26133 is critical with a CVSS score of 9.8.
CVE-2022-26133 affects Atlassian Bitbucket Data Center versions 5.14.0 and later before 7.6.14, 7.7.0 and later prior to 7.17.6, 7.18.0 and later prior to 7.18.4, 7.19.0 and later prior to 7.19.4, and 7.20.0.
Yes, an unauthenticated attacker can exploit CVE-2022-26133.
An attacker can exploit CVE-2022-26133 by executing arbitrary code via Java deserialization.
Yes, you can find references for CVE-2022-26133 at the following links: [Reference 1](https://confluence.atlassian.com/security/multiple-products-security-advisory-hazelcast-vulnerable-to-remote-code-execution-cve-2016-10750-1116292387.html), [Reference 2](https://jira.atlassian.com/browse/BSERV-13173).