2024-12-08 03:06:42 +00:00

64 lines
3.3 KiB
JSON

{
"id": "CVE-2024-21684",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-07-24T18:15:03.793",
"lastModified": "2024-11-21T08:54:51.503",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2.\n\nThis open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction.\n\nAtlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de redireccionamiento abierto de baja gravedad en las versiones afectadas de Bitbucket Data Center. Las versiones de Bitbucket DC de 8.0.0 a 8.9.12 y de 8.19.0 a 8.19.1 se ven afectadas por esta vulnerabilidad. Est\u00e1 parcheado en 8.9.13 y 8.19.2. Esta vulnerabilidad de redireccionamiento abierto, con una puntuaci\u00f3n CVSS de 3.1 y un vector CVSS de CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A: N, permite a un atacante no autenticado redirigir a un usuario v\u00edctima al iniciar sesi\u00f3n en Bitbucket Data Center a cualquier sitio arbitrario que pueda utilizarse para una mayor explotaci\u00f3n, lo que tiene un bajo impacto en la confidencialidad, ning\u00fan impacto en la integridad, ning\u00fan impacto en la disponibilidad y requiere la interacci\u00f3n del usuario. Atlassian recomienda que los clientes de Bitbucket Data Center actualicen a la versi\u00f3n. Si no puede hacerlo, actualice su instancia a una de las versiones fijas admitidas."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@atlassian.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://jira.atlassian.com/browse/BSERV-19454",
"source": "security@atlassian.com"
},
{
"url": "https://jira.atlassian.com/browse/BSERV-19454",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}