#VU69408 OS Command Injection in Bitbucket Server and Bitbucket Data Center - CVE-2022-43781

 

#VU69408 OS Command Injection in Bitbucket Server and Bitbucket Data Center - CVE-2022-43781

Published: November 18, 2022 / Updated: March 16, 2023


Vulnerability identifier: #VU69408
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2022-43781
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Bitbucket Server
Bitbucket Data Center
Software vendor:
Atlassian

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when processing usernames. A remote  attacker with ability to control their own username (e.g. with enabled "Allow public signup" option) can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links