The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday included a a short while ago disclosed critical flaw impacting Atlassian’s Bitbucket Server and Info Center to the Recognised Exploited Vulnerabilities (KEV) catalog, citing evidence of energetic exploitation.
Tracked as CVE-2022-36804, the issue relates to a command injection vulnerability that could allow malicious actors to gain arbitrary code execution on susceptible installations by sending a specially crafted HTTP request.
Successful exploitation, even so, banking institutions on the prerequisite that the attacker presently has access to a community repository or possesses read through permissions to a private Bitbucket repository.
“All variations of Bitbucket Server and Datacenter produced soon after 6.10.17 like 7.. and more recent are afflicted, this implies that all situations that are managing any variations amongst 7.. and 8.3. inclusive are influenced by this vulnerability,” Atlassian mentioned in a late August 2022 advisory.
CISA did not offer even more details about how the flaw is becoming exploited and how popular exploitation endeavours are, but GreyNoise stated it detected proof of in-the-wild on September 20 and 23.
As countermeasures, all Federal Civilian Executive Branch (FCEB) agencies are demanded to remediate the vulnerabilities by Oct 21, 2022 to defend networks from lively threats.
Found this post intriguing? Comply with THN on Facebook, Twitter and LinkedIn to read more exclusive written content we submit.
Some parts of this post are sourced from: