CVE-2017-16857
05.12.2017, 16:29
It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.
Vendor | Product | Version |
---|---|---|
atlassian | bitbucket_auto_unapprove_plugin | 1.0.0 |
atlassian | bitbucket_auto_unapprove_plugin | 1.0.0:beta1 |
atlassian | bitbucket_auto_unapprove_plugin | 1.1.0 |
atlassian | bitbucket_auto_unapprove_plugin | 1.2.0 |
atlassian | bitbucket_auto_unapprove_plugin | 2.0.1 |
atlassian | bitbucket_auto_unapprove_plugin | 2.0.2 |
atlassian | bitbucket_auto_unapprove_plugin | 2.0.4 |
atlassian | bitbucket_auto_unapprove_plugin | 2.1.1 |
atlassian | bitbucket_auto_unapprove_plugin | 2.1.3 |
atlassian | bitbucket_auto_unapprove_plugin | 2.2.0 |
atlassian | bitbucket_auto_unapprove_plugin | 3.0.0 |
𝑥
= Vulnerable software versions