CVE-2019-15000 vulnerability in Atlassian Products
Published on September 19, 2019
The commit diff rest endpoint in Bitbucket Server and Data Center before 5.16.10 (the fixed version for 5.16.x ), from 6.0.0 before 6.0.10 (the fixed version for 6.0.x), from 6.1.0 before 6.1.8 (the fixed version for 6.1.x), from 6.2.0 before 6.2.6 (the fixed version for 6.2.x), from 6.3.0 before 6.3.5 (the fixed version for 6.3.x), from 6.4.0 before 6.4.3 (the fixed version for 6.4.x), and from 6.5.0 before 6.5.2 (the fixed version for 6.5.x) allows remote attackers who have permission to access a repository, if public access is enabled for a project or repository then attackers are able to exploit this issue anonymously, to read the contents of arbitrary files on the system and execute commands via injecting additional arguments into git commands.
Products Associated with CVE-2019-15000
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-15000 are published in these products:
Affected Versions
Atlassian Bitbucket Server:- Version unspecified and below 5.16.10 is affected.
- Version 6.0.0 and below unspecified is affected.
- Version unspecified and below 6.0.10 is affected.
- Version 6.1.0 and below unspecified is affected.
- Version unspecified and below 6.1.8 is affected.
- Version 6.2.0 and below unspecified is affected.
- Version unspecified and below 6.2.6 is affected.
- Version 6.3.0 and below unspecified is affected.
- Version unspecified and below 6.3.5 is affected.
- Version 6.4.0 and below unspecified is affected.
- Version unspecified and below 6.4.3 is affected.
- Version 6.5.0 and below unspecified is affected.
- Version unspecified and below 6.5.2 is affected.
- Version unspecified and below 5.16.10 is affected.
- Version 6.0.0 and below unspecified is affected.
- Version unspecified and below 6.0.10 is affected.
- Version 6.1.0 and below unspecified is affected.
- Version unspecified and below 6.1.8 is affected.
- Version 6.2.0 and below unspecified is affected.
- Version unspecified and below 6.2.6 is affected.
- Version 6.3.0 and below unspecified is affected.
- Version unspecified and below 6.3.5 is affected.
- Version 6.4.0 and below unspecified is affected.
- Version unspecified and below 6.4.3 is affected.
- Version 6.5.0 and below unspecified is affected.
- Version unspecified and below 6.5.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.