{"id":16669,"date":"2021-07-07T16:39:30","date_gmt":"2021-07-07T14:39:30","guid":{"rendered":"https:\/\/herolab-usd.formwandler.rocks\/security-advisories\/usd-2020-0023\/"},"modified":"2021-07-19T14:14:53","modified_gmt":"2021-07-19T12:14:53","slug":"usd-2020-0023","status":"publish","type":"page","link":"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2020-0023\/","title":{"rendered":"usd-2020-0023"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.9.4\" _module_preset=\"default\" background_color=\"#2E353D\" custom_padding=\"||0px|||\"][et_pb_row _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_column type=\"4_4\" _builder_version=\"4.9.4\" _module_preset=\"default\"][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<h1 class=\"h-custom-headline usd-small-letters h2\"><span>usd-2020-0023 (CVE-2020-14170) | Bitbucket Server 7.3<\/span><\/h1>\n<p><span><\/span><br \/><strong>Advisory ID<\/strong><span>: usd-2020-0023<\/span><br \/><strong>CVE Number<\/strong><span>: CVE-2020-14170<\/span><br \/><strong>Affected Product<\/strong><span>: Bitbucket Server<\/span><br \/><strong>Affected Version<\/strong><span>: 5.4.0 &lt;= version &lt; 7.3.1<\/span><br \/><strong>Vulnerability Type<\/strong><span>: Server Side Request Forgery<\/span><br \/><strong>Security Risk<\/strong><span>: Medium<\/span><br \/><strong>Vendor URL<\/strong><span>: <\/span><a href=\"https:\/\/www.atlassian.com\/de\/software\/bitbucket\" target=\"_blank\" rel=\"noopener\">https:\/\/www.atlassian.com\/de\/software\/bitbucket<\/a><br \/><strong>Vendor Status<\/strong><span>: Fixed<\/span><\/p>\n<h3><\/h3>\n<h3>Description<\/h3>\n<p><span>A server side request forgery (SSRF) vulnerability was discovered in the \u201eWebhooks\u201c section if the repository settings page. An authenticated attacker can set the URL field to internal IP addresses and retrieve data using the \u201eTest connection\u201c feature.<\/span><\/p>\n<p><span><\/span><\/p>\n<h3>Proof of Concept (PoC)<\/h3>\n<p><span>1. A new webhook is created under \u201eRepositoy settings -&gt; Webhooks\u201c with a URL pointing to an internal IP \/ port combination. URL of the page is <\/span><em>\/plugins\/servlet\/webhooks\/projects\/PROJECT_NAME\/repos\/REPO_NAME\/<\/em><em>create<\/em><span>.In our example we use a URL value of \u201ehttp:\/\/127.0.0.1:22\u201c to connect to the local SSH daemon:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200023_01.png\" _builder_version=\"4.9.4\" _module_preset=\"default\" title_text=\"usd20200023_01\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<p><span>2. The attacker uses the \u201eTest Connection\u201c feature. There will be a link titled \u201eView details\u201c. Clicking it reveals the SSH version banner:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200023_02.png\" title_text=\"usd20200023_02\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_image src=\"https:\/\/herolab.usd.de\/wp-content\/uploads\/sites\/9\/2021\/07\/usd20200023_03.png\" title_text=\"usd20200023_03\" _builder_version=\"4.9.4\" _module_preset=\"default\" custom_margin=\"27px||43px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" custom_margin=\"||27px||false|false\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e15493-11 x-container max width\">\n<div class=\"e15493-12 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<p>The last image shows the Apache MINA SSHD banner on port 15998 that we found running on this instance of Bitbucket Server.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"e15493-15 x-container max width\">\n<div class=\"e15493-16 x-column x-sm x-1-1\"><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.9.4\" _module_preset=\"cc5ac6f4-ebbd-4b3f-bc92-4dfc1f15fe2c\" hover_enabled=\"0\" sticky_enabled=\"0\"]<\/p>\n<div class=\"e16902-22 x-container max width\">\n<div class=\"e16902-23 x-column x-sm x-1-1\">\n<h3>Fix<\/h3>\n<div class=\"x-text\">\n<p>Consider adding an instance-wide whitelisting feature or deploy a comprehensive filtering of local and internal IP addresses.<\/p>\n<\/div>\n<h3><\/h3>\n<h3>References<\/h3>\n<p><a href=\"https:\/\/owasp.org\/www-community\/attacks\/Server_Side_Request_Forgery\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/attacks\/Server_Side_Request_Forgery<\/a><\/p>\n<h3><\/h3>\n<h3>Timeline<\/h3>\n<ul>\n<li>2020-03-12 First contact request via <a href=\"mailto:security@atlassian.com\">security@atlassian.com<\/a><\/li>\n<li>2020-05-20 Contact request via Support forum<\/li>\n<li>2020-07-08 Vendor publishes advisory: <a href=\"https:\/\/jira.atlassian.com\/browse\/BSERV-12433\" target=\"_blank\" rel=\"noopener\">https:\/\/jira.atlassian.com\/browse\/BSERV-12433<\/a><\/li>\n<li>2020-07-15 Security advisory released<\/li>\n<\/ul>\n<h3><\/h3>\n<h3>Credits<\/h3>\n<p><span>This security vulnerability was found by Marcus Nilsson of usd AG.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>usd-2020-0023 (CVE-2020-14170) | Bitbucket Server 7.3 Advisory ID: usd-2020-0023CVE Number: CVE-2020-14170Affected Product: Bitbucket ServerAffected Version: 5.4.0 &lt;= version &lt; 7.3.1Vulnerability Type: Server Side Request ForgerySecurity Risk: MediumVendor URL: https:\/\/www.atlassian.com\/de\/software\/bitbucketVendor Status: Fixed Description A server side request forgery (SSRF) vulnerability was discovered in the \u201eWebhooks\u201c section if the repository settings page. An authenticated attacker can set [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":16124,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-16669","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=16669"}],"version-history":[{"count":0,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16669\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/pages\/16124"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=16669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}