Bitbucket Data Center Security Advisory 2019-05-22

Bitbucket Data Center - Path traversal in the migration tool RCE - CVE-2019-3397

Summary

CVE-2019-3397 - Path traversal in the migration tool

Advisory Release Date

22 May 2019, 10:00 AM PDT (Pacific Time, -7 hours)

ProductBitbucket Data Center 

(Note: Bitbucket Server without a Data Center license is unaffected)

Affected Bitbucket Data Center Versions

  • 5.13.0 <= version < 5.13.6
  • 5.14.0 <= version < 5.14.4
  • 5.15.0 <= version < 5.15.3
  • 5.16.0 <= version < 5.16.3
  • 6.0.0 <= version < 6.0.3
  • 6.1.0 <= version 6.1.2

Fixed Bitbucket Data Center Versions

  • 5.13.6
  • 5.14.4
  • 5.15.3
  • 5.16.3
  • 6.0.3
  • 6.1.2
CVE ID(s)CVE-2019-3397

Summary of Vulnerability

This advisory discloses a critical severity security vulnerability which was introduced in version 5.13.0 of Bitbucket Data Center. Versions of Bitbucket Data Center starting with 5.13.0 before 5.13.6 (the fixed version for 5.13.x), from 5.14.0 before 5.14.4 (fixed version for 5.14.x), from 5.15.0 before 5.15.3 (fixed version for 5.15.x), from 5.16.0 before 5.16.3 (fixed version for 5.16.x), from 6.0.0 before 6.0.3 (fixed version for 6.0.x), and from 6.1.0 before 6.1.2 (the fixed version for 6.1.x) are affected by this vulnerability.

Customers who have upgraded Bitbucket Data Center to version 5.13.6, 5.14.4, 5.15.3, 5.16.3, 6.0.3 or 6.1.2 are not affected.

Customers who have downloaded and installed:

  • Bitbucket Data Center >= 5.13.0 less than 5.13.6 (the fixed version for 5.13.0)
  • Bitbucket Data Center >= 5.14.0 less than 5.14.4 (the fixed version for 5.14.0)
  • Bitbucket Data Center >= 5.15.0 less than 5.15.3 (the fixed version for 5.15.0)
  • Bitbucket Data Center >= 5.16.0 less than 5.16.3 (the fixed version for 5.16.0)
  • Bitbucket Data Center >= 6.0.0 less than 6.0.3 (the fixed version for 6.0.0)
  • Bitbucket Data Center >= 6.1.0 less than 6.1.2 (the fixed version for 6.1.0)

Please upgrade your Bitbucket Data Center installations immediately to fix this vulnerability.

Path traversal in the migration tool - CVE-2019-3397

Severity

Atlassian rates the severity level of this vulnerability as critical, according to the scale published in our Atlassian severity levels. The scale allows us to rank the severity as critical, high, moderate or low.

This is our assessment and you should evaluate its applicability to your own IT environment.

Description

Bitbucket Data Center had a path traversal vulnerability in the Data Center migration tool. A remote attacker with authenticated user with admin permissions can exploit this path traversal vulnerability to write files to arbitrary locations which can lead to remote code execution on systems that run a vulnerable version of Bitbucket Data Center. Bitbucket Server versions without a Data Center license are not vulnerable to this vulnerability.


This issue can be tracked here: BSERV-11706 - Getting issue details... STATUS

Acknowledgements

Credit for finding this vulnerability goes to Johannes Moritz from RIPS Technologies (https://www.ripstech.com/research/)

Fix

We have taken the following steps to address this issue:

  1. Released Bitbucket Data Center version 6.1.2 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download/data-center
  2. Released Bitbucket Data Center version 6.0.3 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download-archives
  3. Released Bitbucket Data Center version 5.16.3 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download-archives
  4. Released Bitbucket Data Center version 5.15.3 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download-archives
  5. Released Bitbucket Data Center version 5.14.4 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download-archives
  6. Released Bitbucket Data Center version 5.13.6 that contains a fix for this issue and can be downloaded from https://www.atlassian.com/software/bitbucket/download-archives

What You Need to Do

Atlassian recommends that you upgrade to the latest version. For a full description of the latest version of Bitbucket Data Center, see the release notes. You can download the latest version of Bitbucket Data Center from the download centre.


Upgrade Bitbucket Data Center to version 6.1.2 or higher.

If you are running Bitbucket Data Center 5.13.x and cannot upgrade to 6.1.2  then upgrade to version 5.13.6.

If you are running Bitbucket Data Center 5.14.x and cannot upgrade to 6.1.2 then upgrade to version 5.14.4.

If you are running Bitbucket Data Center 5.15.x and cannot upgrade to 6.1.2 then upgrade to version 5.15.3.

If you are running Bitbucket Data Center 5.16.x and cannot upgrade to 6.1.2 then upgrade to version 5.16.3.

If you are running Bitbucket Data Center 6.0.x and cannot upgrade to 6.1.2 then upgrade to version 6.0.3.

Mitigation

The import functionality can be disabled via a feature flag, which would mitigate this vulnerability. This can be done by setting the property feature.data.center.migration.import=false in bitbucket.properties. Note that the export functionality would still work in this case. Bitbucket Server must then be restarted for changes to become effective.

If an import task still needs to be run, enable the feature on an isolated cluster node (inaccessible by users and admins but still connected to the cluster and accessible by sysadmins) with a node-local bitbucket.properties file where the property feature.data.center.migration.import=true is set. Imports can then be started by talking to this node directly while it would still be disabled on other nodes.

Support

If you did not receive an email for this advisory and you wish to receive such emails in the future go to https://my.atlassian.com/email and subscribe to Alerts emails.

If you have questions or concerns regarding this advisory, please raise a support request at https://support.atlassian.com/.

References

Security Bug fix Policy

As per our new policy critical security bug fixes will be back ported in accordance with https://www.atlassian.com/trust/security/bug-fix-policy.  We will release new maintenance releases for the versions covered by the policy instead of binary patches.

Binary patches are no longer released. 

Severity Levels for security issuesAtlassian security advisories include a severity level and a CVE identifier. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can also learn more about CVSS at FIRST.org.
End of Life Policy Our end of life policy varies for different products. Please refer to our EOL Policy for details. 
Last modified on May 20, 2022

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.