Updated on 2022-11-18: Atlassian Patches Critical Flaws in Bitbucket and Crowd
Atlassian has released fixes to address vulnerabilities in both Crowd and Bitbucket Server and Data Center. Both flaws are considered critical. The command injection vulnerability in Bitbucket was introduced in version 7.0.0 of Bitbucket Server and Data Center and affects versions 7.0 to 7.21 and versions 8.0 to 8.4 if mesh.enabled is set to false in bitbucket.properties. The security misconfiguration vulnerability in Crowd was introduced in version 3.0.0 and affect all subsequent versions if they are both new installations of affected versions and an IP address has been added to the Remote Address configuration of the Crowd application.
- The Crowd attack has to come from an IP address in your allow list, where the attack can bypass an authentication check. Make sure that you’re on a fixed/supported version of Crowd, and cross-check your Remote Address configuration. The Bitbucket fix requires applying the update. It is possible to slightly reduce the risk by disabling public signup, but this really only moves the attack from unauthenticated to authenticated users, so if someone has credentials, it’s still game-over.
Read more in
- Atlassian Patches Critical Vulnerabilities in Bitbucket, Crowd
- Atlassian Releases Patches for Critical Flaws Affecting Crowd and Bitbucket Products
- Bitbucket Server and Data Center Security Advisory 2022-11-16
- Crowd Security Advisory (November 2022)
Updated on 2022-10-03: CISA KEV update
CISA has updated its KEV database with three new vulnerabilities that are being exploited in the wild. This includes the two zero-days in Microsoft Exchange servers disclosed last week (CVE-2022-41040 and CVE-2022-41082) and a vulnerability in Atlassian Bitbucket servers (CVE-2022-36804). Read more:
- CISA Adds Three Known Exploited Vulnerabilities to Catalog
- CVE-2022-41040 Detail
- CVE-2022-41082 Detail
- CVE-2022-36804 Detail
Overview: CISA Adds Microsoft and Atlassian Flaws to Known Exploited Vulnerabilities Catalog
The US Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog. All three – a command injection vulnerability in Atlassian Bitbucket Server and Data Center, and a server-side request forgery vulnerability and a remote code execution vulnerability in Microsoft Exchange server – have mitigation deadlines of October 21.
The KEV instructions for mitigation for all three of these is to apply vendor updates. The Bitbucket issue goes back to August; this should be well and truly patched by now. The Microsoft Exchange issues are still waiting on patches, but you can follow their mitigation guidance.
Read more in