Description and Immediate Mitigation Steps
Vulnerability Information:
-
- Severity: The critical vulnerability in Bitbucket Data Center, Bitbucket Server is classified as “High.”
- Versions Impacted: 7.21.0, 7.21.1, 7.21.2, 7.21.3, 7.21.4, 7.21.5, 7.21.6, 7.21.7, 7.21.8, 7.21.9, 7.21.10, 7.21.11, 7.21.12, 7.21.13, 8.9.0, 8.9.1, 8.9.2, 8.11.0, 8.12.0, 8.9.3, 7.21.14, 7.21.15, 8.9.4, 8.12.1, 8.13.0, 8.14.0, 8.13.1, 8.9.5, 8.12.2, 7.21.16, 8.15.0, 7.21.17, 8.9.6, 8.12.3, 8.13.2, 8.14.1, 8.16.0, 7.21.18, 8.9.7, 8.12.4, 8.13.3, 8.14.2, 8.15.1, 7.21.19, 8.9.8, 8.12.5, 8.13.4, 8.14.3, 8.15.2, 8.16.1, 8.14.0-eap01, 7.21.20
- Patch Management
- CVE Identifier: The specific vulnerability is tracked as CVE-2023-46589
- CVSS Score: Atlassian assigned a CVSS score of 7.5 to this vulnerability, highlighting its severity. This score is due to the ability for unauthenticated attacker to expose assets in your environment susceptible to exploitation.
- Vulnerability Description: This vulnerability allows an unauthenticated attacker to expose assets in your environment susceptible to exploitation. It has no impact on confidentiality, a high impact on integrity, no impact on availability, and requires no user interaction.
Affected Versions:
-
-
This High severity org.apache.tomcat.embed:tomcat-embed-core Dependency vulnerability was introduced in versions 7.21.0, 8.9.0, 8.13.0, 8.14.0, 8.15.0, and 8.16.0 of Bitbucket Data Center and Server.
-
Recommended Actions:
-
- Tomcat Fix: Users are recommended to upgrade to specific versions of Apache Tomcat (11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards, or 8.5.96 onwards) to resolve the issue.
- Bitbucket Data Center and Server customers should upgrade to the latest version.
- If unable to upgrade to the latest version, upgrade your instance to one of the specified supported fixed versions based on your current version:
- For Bitbucket Data Center and Server 7.21, upgrade to a release greater than or equal to 7.21.21.
- For Bitbucket Data Center and Server 8.9, upgrade to a release greater than or equal to 8.9.9.
- For Bitbucket Data Center and Server 8.13, upgrade to a release greater than or equal to 8.13.5.
- For Bitbucket Data Center and Server 8.14, upgrade to a release greater than or equal to 8.14.4.
- For Bitbucket Data Center 8.15, upgrade to a release greater than or equal to 8.15.3.
- For Bitbucket Data Center 8.16, upgrade to a release greater than or equal to 8.16.2.
Standard Manual Upgrade Steps:
-
- Notify users of outage for critical hotfixing
- Stop services across all nodes
- Backup existing database and shared home prior to upgrade
- Make copies of the setenv.sh and server.xml found in the application install directories bin & conf (these hold critical settings we want to propogate again post upgrade
- Download the hotfix from the Atlassian archives
- Apply the upgrade, do not auto-start services
- Copy back the setenv.sh, server.xml, and any other customized files you had to copy during the upgrade process
- Restart services and perform smoke testing once Confluence is available
Conclusion:
Here is the notice from the National Vulnerability Database
Link to Atlassian ticket can be found here.
Thanks for visiting, click here to learn more about out our Atlassian Cloud Services!