CVE-2017-16857
Current Description
It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.
Basic Data
Published | December 05, 2017 |
Last Modified | October 03, 2019 |
Assigner | cve@mitre.org |
Data Type | CVE |
Data Format | MITRE |
Data Version | 4.0 |
Problem Type | CWE-362 |
CVE Data Version | 4.0 |
Base Metric V2
CVSS 2 - Version | 2.0 |
CVSS 2 - Vector String | AV:N/AC:M/Au:S/C:P/I:P/A:P |
CVSS 2 - Access Vector | NETWORK |
CVSS 2 - Access Complexity | MEDIUM |
CVSS 2 - Authentication | SINGLE |
CVSS 2 - Confidentiality Impact | PARTIAL |
CVSS 2 - Availability Impact | PARTIAL |
CVSS 2 - Base Score | 6.0 |
Severity | MEDIUM |
Exploitability Score | 6.8 |
Impact Score | 6.4 |
Obtain All Privilege | false |
Obtain User Privilege | false |
Obtain Other Privilege | false |
Base Metric V3
CVSS 3 - Version | 3.0 |
CVSS 3 - Vector String | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
CVSS 3 - Attack Vector | NETWORK |
CVSS 3 - Attack Complexity | HIGH |
CVSS 3 - Privileges Required | LOW |
CVSS 3 - User Interaction | NONE |
CVSS 3 - Scope | CHANGED |
CVSS 3 - Confidentiality Impact | HIGH |
CVSS 3 - Integrity Impact | HIGH |
CVSS 3 - Availability Impact | HIGH |
CVSS 3 - Base Score | 8.5 |
CVSS 3 - Base Severity | HIGH |
Exploitability Score | 1.8 |
Base Severity | HIGH |
Configurations
-
OR - Configuration 1
Cpe Version | Part | Vendor | Product | Version | Update | Edition | Language | SW Edition | Target SW | Target HW | Other | Version Start Including | Version End Including | Version Start Excluding | Version End Excluding |
2.3 | Application | Atlassian | Bitbucket Auto Unapprove Plugin | 1.0.0 | * | * | * | * | * | * | * | |