-
Public Security Vulnerability
-
Resolution: Fixed
-
Highest
-
8.19.0, 8.19.1, 8.19.2, 8.19.3, 8.19.4, 8.19.5, 8.19.6, 8.19.7, 8.19.8, 8.19.9, 8.19.10, 8.19.11, 8.19.12, 8.19.13, 8.19.14, 8.19.15
-
None
-
9.3
-
Critical
-
CVE-2023-45133
-
Atlassian (Internal)
-
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
-
RCE (Remote Code Execution)
-
Bitbucket Data Center, Bitbucket Server
note:
- This is a critical vulnerability in a non-Atlassian Bitbucket dependency. However, Atlassian’s application of the dependency presents a lower assessed risk, which is why we are disclosing this vulnerability in our monthly Security Bulletin instead of a Critical Security Advisory.
This Critical severity vulnerability known as CVE-2023-45133 was introduced in 8.19.0, 8.19.1, 8.19.2, 8.19.3, 8.19.4, 8.19.5, 8.19.6, 8.19.7, 8.19.8, 8.19.9, 8.19.10, 8.19.11, 8.19.12, 8.19.13, 8.19.14, 8.19.15 of Bitbucket Data Center and Server.
This vulnerability with a CVSS Score of 9.3 and a CVSS Vector of CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Atlassian recommends that Bitbucket Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:
- Bitbucket Data Center and Server 8.19: Upgrade to a release greater than or equal to 8.19.25
See the release notes. You can download the latest version of Bitbucket Data Center and Server from the download center.