{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/240785#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nAtlassian Bitbucket on Windows fails to properly set ACLs, which can allow an unprivileged Windows user to run arbitrary code with SYSTEM privileges.\r\n\r\n### Description\r\n\r\nThe Atlassian Bitbucket Windows installer fails to set a secure access-control list (ACL) on the default installation directory, such as `C:\\Atlassian\\Bitbucket\\`. By default, unprivileged users can create files in this directory structure, which creates a privilege-escalation vulnerability.\r\n\r\n### Impact\r\nBy placing a specially-crafted DLL file in the Bitbucket installation directory, an unprivileged user may be able to execute arbitrary code with SYSTEM privileges on a Windows system with the vulnerable Bitbucket software installed. See [DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1574/001/) for more details.\r\n\r\n### Solution\r\n#### Apply an update\r\nThis issue has been addressed in the Bitbucket Windows installer for versions 7.10.1, 7.6.4, and 6.10.9. Please see https://jira.atlassian.com/browse/BSERV-12753 for more details.\r\n\r\n\r\n### Acknowledgements\r\nThis vulnerability was reported by Will Dormann of the CERT/CC.\r\n\r\nThis document was written by Will Dormann.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/240785"},{"url":"https://jira.atlassian.com/browse/BSERV-12753","summary":"https://jira.atlassian.com/browse/BSERV-12753"},{"url":"https://jira.atlassian.com/browse/BSERV-12753","summary":"Reference(s) from vendor \"Atlassian\""}],"title":"Atlassian Bitbucket on Windows is vulnerable to privilege escalation due to weak ACLs","tracking":{"current_release_date":"2021-02-18T18:01:37+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#240785","initial_release_date":"2021-02-18 18:01:37.465772+00:00","revision_history":[{"date":"2021-02-18T18:01:37+00:00","number":"1.20210218180137.1","summary":"Released on 2021-02-18T18:01:37+00:00"}],"status":"final","version":"1.20210218180137.1"}},"vulnerabilities":[{"title":"Atlassian Bitbucket on Windows is vulnerable to privilege escalation by failing to properly set ACLs on its installation directory.","notes":[{"category":"summary","text":"Atlassian Bitbucket on Windows is vulnerable to privilege escalation by failing to properly set ACLs on its installation directory."}],"cve":"CVE-2020-36233","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#240785"}],"product_status":{"known_affected":["CSAFPID-e9269fe8-39db-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"Atlassian","product":{"name":"Atlassian Products","product_id":"CSAFPID-e9269fe8-39db-11f1-8422-122e2785dc9f"}}]}}