CVE-2022-43781

There is a command injection vulnerability using environment variables in Bitbucket Server and Data Center. An attacker with permission to control their username can exploit this issue to execute arbitrary code on the system. This vulnerability can be unauthenticated if the Bitbucket Server and Data Center instance has enabled “Allow public signup”.
References
Link Resource
https://confluence.atlassian.com/x/Y4hXRg Mitigation Release Notes Vendor Advisory
https://jira.atlassian.com/browse/BSERV-13522 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-11-17 00:15

Updated : 2024-10-02 15:35


NVD link : CVE-2022-43781

Mitre link : CVE-2022-43781

CVE.ORG link : CVE-2022-43781


JSON object : View

Products Affected

atlassian

  • bitbucket
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')