We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-21684



Assigneratlassian
Reserved2024-01-01
Published2024-07-24
Updated2024-11-05

Description

There is a low severity open redirect vulnerability within affected versions of Bitbucket Data Center. Versions of Bitbucket DC from 8.0.0 to 8.9.12 and 8.19.0 to 8.19.1 are affected by this vulnerability. It is patched in 8.9.13 and 8.19.2. This open redirect vulnerability, with a CVSS Score of 3.1 and a CVSS Vector of CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N, allows an unauthenticated attacker to redirect a victim user upon login to Bitbucket Data Center to any arbitrary site which can be utilized for further exploitation which has low impact to confidentiality, no impact to integrity, no impact to availability, and requires user interaction. Atlassian recommends that Bitbucket Data Center customers upgrade to the version. If you are unable to do so, upgrade your instance to one of the supported fixed versions.



LOW: 3.1CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Product status

8.19.1
affected

8.9.0 to 8.9.12
affected

8.8.0 to 8.8.7
affected

8.7.0 to 8.7.5
affected

8.6.0 to 8.6.4
affected

8.5.0 to 8.5.4
affected

8.4.0 to 8.4.4
affected

8.3.0 to 8.3.4
affected

8.2.2 to 8.2.4
affected

8.1.3 to 8.1.5
affected

8.0.3 to 8.0.5
affected

8.19.2 to 8.19.6
unaffected

8.9.13 to 8.9.17
unaffected

Credits

Taha YILDIRIM

References

https://jira.atlassian.com/browse/BSERV-19454

cve.org CVE-2024-21684

nvd.nist.gov CVE-2024-21684

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-21684
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.