Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-36804

Description

Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.0 before version 7.21.4, from version 8.0.0 before version 8.0.3, from version 8.1.0 before version 8.1.3, and from version 8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 allows remote attackers with read permissions to a public or private Bitbucket repository to execute arbitrary code by sending a malicious HTTP request. This vulnerability was reported via our Bug Bounty Program by TheGrandPew.

POC

Reference

- http://packetstormsecurity.com/files/168470/Bitbucket-Git-Command-Injection.html

- http://packetstormsecurity.com/files/171453/Bitbucket-7.0.0-Remote-Command-Execution.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0xEleven/CVE-2022-36804-ReverseShell

- https://github.com/20142995/Goby

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/BenHays142/CVE-2022-36804-PoC-Exploit

- https://github.com/CEOrbey/CVE-2022-36804-POC

- https://github.com/Chocapikk/CVE-2022-36804-ReverseShell

- https://github.com/ColdFusionX/CVE-2022-36804

- https://github.com/Inplex-sys/CVE-2022-36804

- https://github.com/J1ezds/Vulnerability-Wiki-page

- https://github.com/JRandomSage/CVE-2022-36804-MASS-RCE

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/LTiDi2000/BitBucketKiller

- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection

- https://github.com/Loginsoft-Research/Linux-Exploit-Detection

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SYRTI/POC_to_review

- https://github.com/SystemVll/CVE-2022-36804

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Vulnmachines/bitbucket-cve-2022-36804

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/asepsaepdin/CVE-2022-36804

- https://github.com/benjaminhays/CVE-2022-36804-PoC-Exploit

- https://github.com/cryptolakk/CVE-2022-36804-RCE

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/devengpk/CVE-2022-36804

- https://github.com/fardeen-ahmed/Bug-bounty-Writeups

- https://github.com/iamthefrogy/BountyHound

- https://github.com/imbas007/Atlassian-Bitbucket-CVE-2022-36804

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/karimhabush/cyberowl

- https://github.com/khal4n1/CVE-2022-36804

- https://github.com/kljunowsky/CVE-2022-36804-POC

- https://github.com/lairdking/read_sheet

- https://github.com/lolminerxmrig/Capricornus

- https://github.com/luck-ying/Goby2.0-POC

- https://github.com/luck-ying/Library-POC

- https://github.com/manas3c/CVE-POC

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/notdls/CVE-2022-36804

- https://github.com/notxesh/CVE-2022-36804-PoC

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/qiwentaidi/CVE-2022-36804

- https://github.com/tahtaciburak/cve-2022-36804

- https://github.com/trhacknon/CVE-2022-36804-ReverseShell

- https://github.com/trhacknon/Pocingit

- https://github.com/ui-bootstrap/CVE-2022-36804

- https://github.com/vj4336/CVE-2022-36804-ReverseShell

- https://github.com/walnutsecurity/cve-2022-36804

- https://github.com/whoforget/CVE-POC

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve

- https://github.com/zhanpengliu-tencent/medium-cve