Uploaded image for project: 'Bitbucket Data Center'
  1. Bitbucket Data Center
  2. BSERV-10439

Race condition in auto-unapprove plugin - CVE-2017-16857

      It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end.
      This allows an attacker to merge any code into unsuspecting repositories.

      All versions before version 3.0.1 of the auto-unapprove plugin are affected, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket

            [BSERV-10439] Race condition in auto-unapprove plugin - CVE-2017-16857

            Owen made changes -
            Workflow Original: Stash Workflow - Restricted [ 2486770 ] New: JAC Bug Workflow v3 [ 3137287 ]
            Owen made changes -
            Symptom Severity Original: Major [ 14431 ] New: Severity 2 - Major [ 15831 ]
            David Black made changes -
            Labels Original: CVE-2017-16857 race-condition security New: CVE-2017-16857 advisory advisory-released race-condition security
            David Black made changes -
            Labels Original: CVE-2017-16857 security New: CVE-2017-16857 race-condition security
            David Black made changes -
            Remote Link Original: This issue links to "Page (Extranet)" [ 338081 ]
            David Black made changes -
            Summary Original: Race condition in auto-unapprove plugin New: Race condition in auto-unapprove plugin - CVE-2017-16857
            David Black made changes -
            Description Original: It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end.
             This allows an attacker to merge any code into unsuspecting repositories.

            This affects all versions before version 3.0.1 of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket
            New: It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end.
             This allows an attacker to merge any code into unsuspecting repositories.

            All versions before version 3.0.1 of the auto-unapprove plugin are affected, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket
            David Black made changes -
            Description Original: It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end.
            This allows an attacker to merge any code into unsuspecting repositories.

            This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket
            New: It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end.
             This allows an attacker to merge any code into unsuspecting repositories.

            This affects all versions before version 3.0.1 of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket

            CVSS v3 score: 8.5 => High severity

            Exploitability Metrics

            Attack Vector Network
            Attack Complexity High
            Privileges Required Low
            User Interaction None

            Scope Metric

            Scope Changed

            Impact Metrics

            Confidentiality High
            Integrity High
            Availability High

            Matt Hart (Inactive) added a comment - CVSS v3 score: 8.5 => High severity Exploitability Metrics Attack Vector Network Attack Complexity High Privileges Required Low User Interaction None Scope Metric Scope Changed Impact Metrics Confidentiality High Integrity High Availability High
            Matt Hart (Inactive) made changes -
            Labels New: CVE-2017-16857 security

              khughes@atlassian.com Kristy
              khughes@atlassian.com Kristy
              Affected customers:
              0 This affects my team
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: