关联漏洞
标题:
Atlassian Bitbucket Server 安全漏洞
(CVE-2022-36804)
描述:Atlassian Bitbucket Server是澳大利亚Atlassian公司的一款Git代码托管解决方案。该方案能够管理并审查代码,具有差异视图、JIRA集成和构建集成等功能。 Atlassian Bitbucket Server and Data Center存在安全漏洞,该漏洞源于允许对公共或私有Bitbucket库有读取权限的远程攻击者通过发送恶意的HTTP请求执行任意代码。以下产品及版本受到影响:7.0.0 至 7.6.17 之前版本,7.7.0 至 7.17.10 之前版本,7.18.0
描述
PoC exploit for CVE-2022-36804 (BitBucket Critical Command Injection)
介绍
# Original Project
[https://github.com/BenHays142/CVE-2022-36804-PoC-Exploit](https://github.com/BenHays142/CVE-2022-36804-PoC-Exploit)
# CVE-2022-36804-PoC-Exploit
A somewhat reliable PoC exploit for CVE-2022-36804 (BitBucket Critical Command Injection). This attack generally requires public repos to be enabled, however session cookies are also compatible with this exploit. Note: this exploit includes automatic repo detection which is handy if you don't want to manually find open repos yourself.
## How To Install
```bash
git clone https://github.com/Chocapikk/CVE-2022-36804-ReverseShell.git;
cd CVE-2022-36804-ReverseShell
python3 -m pip install -r requirements.txt
python3 main.py --server [target]
```
## How To Use
```
usage: main.py [-h] [--server SERVER] [--project PROJECT] [--repo REPO] [--skip-auto]
[--session SESSION] [--command CMD] [--file FILE] [--output OUTPUT]
[--lhost LHOST] [--lport LPORT] [--threads THREADS]
Exploit BitBucket Instances (< v8.3.1) using CVE-2022-36804. Exploits automagically
without any extra parameters, but allows for custom settings as well.
options:
-h, --help show this help message and exit
--server SERVER Host to attack
--project PROJECT The name of the project the repository resides in
--repo REPO The name of the repository
--skip-auto Skip the automatic finding of exploitable repos
--session SESSION Value of 'BITBUCKETSESSIONID' cookie, useful if target repo is
private
--command CMD Command to execute if exploit is successful (Note: getting output
isn't reliable so OOB exfil is a must)
--file FILE File to scan bulk hosts
--output OUTPUT Output file for the session
--lhost LHOST Your Local Host for reverse shell
--lport LPORT Your Local Port for reverse shell
--threads THREADS Threads for mass exploitation
```
## Zoomeye Dorks
```bash
app:"Bitbucket" +banner:"repos?visibility=public"
app:"Bitbucket" +title:"public"
app:"Bitbucket"
iconhash:667017222
```
## References
[Atlassian Advisory](https://confluence.atlassian.com/bitbucketserver/bitbucket-server-and-data-center-advisory-2022-08-24-1155489835.html)
[Atlassian Jira Issue](https://jira.atlassian.com/browse/BSERV-13438)
[NIST CVE](https://nvd.nist.gov/vuln/detail/CVE-2022-36804)
文件快照
[4.0K] /data/pocs/a8022b6a3839b6c65c17e37a576338929e7259d1
├── [8.4K] main.py
├── [2.3K] README.md
└── [ 46] requirements.txt
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。