Unauthenticated Remote Code Execution in GitBucket by Exploiting Weak Tokens
CVE-2018-25332
Key Information:
Badges
What is CVE-2018-25332?
GitBucket 4.23.1 is susceptible to an unauthenticated remote code execution vulnerability that can be exploited by attackers to execute arbitrary commands. This vulnerability arises from the use of weak secret token generation and insecure file upload functionality. Attackers may potentially brute-force the Blowfish encryption key and upload a malicious JAR plugin through the git-lfs endpoint. Furthermore, they can run system commands via another exposed exploit endpoint, compromising the security of the affected system.
Affected Version(s)
GitBucket 4.23.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
