mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
142 lines
5.4 KiB
JSON
142 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2019-3397",
|
|
"sourceIdentifier": "security@atlassian.com",
|
|
"published": "2019-06-03T14:29:00.293",
|
|
"lastModified": "2019-06-03T15:52:57.687",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Atlassian Bitbucket Data Center licensed instances starting with version 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) allow remote attackers who have admin permissions to achieve remote code execution on a Bitbucket server instance via path traversal through the Data Center migration tool."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Atlassian Bitbucket Data Center con licencias que comienzan con la versi\u00f3n 5.13.0 anterior a la 5.13.6 (la versi\u00f3n fija para 5.13.x), desde la versi\u00f3n 5.14.0 anterior a la 5.14.4 (versi\u00f3n fija para la 5.14.x), desde la versi\u00f3n 5.15.0 hasta la 5.15. 3 (versi\u00f3n fija para 5.15.x), de versi\u00f3n 5.16.0 anterior a 5.16.3 (versi\u00f3n fija de 5.16.x), desde versi\u00f3n 6.0.0 anterior a 6.0.3 (versi\u00f3n fija para 6.0.x), y desde versi\u00f3n 6.1.0 anterior a 6.1.2 (la versi\u00f3n fija para 6.1.x), permite a los atacanterior remotos con permisos de administrador lograr la ejecuci\u00f3n de c\u00f3digo remota en una instancia del servidor Bitbucket por medio de un salto de path (path trasversal) de la herramienta de migraci\u00f3n del Centro de Datos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.1,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 6.0
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.13.0",
|
|
"versionEndExcluding": "5.13.6",
|
|
"matchCriteriaId": "A6215D87-F4E1-445C-B201-89F411229CA4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.14.0",
|
|
"versionEndExcluding": "5.14.4",
|
|
"matchCriteriaId": "6EFC24FA-DFFB-45B6-8F63-3AFDE1CC5464"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.15.0",
|
|
"versionEndExcluding": "5.15.3",
|
|
"matchCriteriaId": "6FD74B56-390D-48CB-93BB-0452869D58D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "5.16.0",
|
|
"versionEndExcluding": "5.16.3",
|
|
"matchCriteriaId": "0F6EA7D6-40E5-4F3D-B5C4-16DB7AB421A6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.0.0",
|
|
"versionEndExcluding": "6.0.3",
|
|
"matchCriteriaId": "1D61084D-DA80-4EAD-AABA-DD94F9A69475"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "6.1.0",
|
|
"versionEndExcluding": "6.1.2",
|
|
"matchCriteriaId": "9E69F799-F16F-4C25-AE84-5D73CBEAD71D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://jira.atlassian.com/browse/BSERV-11706",
|
|
"source": "security@atlassian.com",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |