CVE-2017-16857

It is possible to bypass the bitbucket auto-unapprove plugin via minimal brute-force because it is relying on asynchronous events on the back-end. This allows an attacker to merge any code into unsuspecting repositories. This affects all versions of the auto-unapprove plugin, however since the auto-unapprove plugin is not bundled with Bitbucket Server it does not affect any particular version of Bitbucket.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.5 HIGH
NETWORK
HIGH
LOW
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
atlassianCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 52%
VendorProductVersion
atlassianbitbucket_auto_unapprove_plugin
1.0.0
atlassianbitbucket_auto_unapprove_plugin
1.0.0:beta1
atlassianbitbucket_auto_unapprove_plugin
1.1.0
atlassianbitbucket_auto_unapprove_plugin
1.2.0
atlassianbitbucket_auto_unapprove_plugin
2.0.1
atlassianbitbucket_auto_unapprove_plugin
2.0.2
atlassianbitbucket_auto_unapprove_plugin
2.0.4
atlassianbitbucket_auto_unapprove_plugin
2.1.1
atlassianbitbucket_auto_unapprove_plugin
2.1.3
atlassianbitbucket_auto_unapprove_plugin
2.2.0
atlassianbitbucket_auto_unapprove_plugin
3.0.0
𝑥
= Vulnerable software versions