nomisec
WORKING POC
35 stars
by notdls · remote
https://github.com/notdls/CVE-2022-36804
This repository contains a functional exploit for CVE-2022-36804, a remote code execution vulnerability in BitBucket Server and Data Center versions prior to 8.3.1. The exploit leverages a path traversal and command injection flaw in the repository archive endpoint to execute arbitrary commands on the target system.
Classification
Working Poc 100%
Target:
BitBucket Server and Data Center < 8.3.1
No auth needed
Prerequisites:
Access to a public repository on the target instance or valid session credentials for private repositories
nomisec
WORKING POC
18 stars
by notxesh · remote
https://github.com/notxesh/CVE-2022-36804-PoC
This repository contains a functional exploit for CVE-2022-36804, targeting Bitbucket Server/DC. The exploit leverages command injection via crafted parameters in the archive endpoint to achieve RCE, SSRF, and file download capabilities.
Classification
Working Poc 95%
Target:
Bitbucket Server/DC (versions affected by CVE-2022-36804)
No auth needed
Prerequisites:
Network access to the target Bitbucket instance · Publicly accessible repository endpoint
nomisec
WORKING POC
16 stars
by benjaminhays · remote-auth
https://github.com/benjaminhays/CVE-2022-36804-PoC-Exploit
This repository contains a functional exploit for CVE-2022-36804, a critical command injection vulnerability in Bitbucket Server and Data Center versions before 8.3.1. The exploit automates the discovery of vulnerable repositories and executes arbitrary commands via crafted API requests.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center < 8.3.1
No auth needed
Prerequisites:
Public repositories enabled or valid session cookie for private repos
nomisec
WORKING POC
12 stars
by SystemVll · remote
https://github.com/SystemVll/CVE-2022-36804
This repository contains a functional exploit for CVE-2022-36804, a Bitbucket Server and Data Center RCE vulnerability. The exploit leverages a command injection flaw in the archive download functionality by manipulating the `prefix` parameter to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Bitbucket Server and Data Center (versions 7.6 prior to 7.6.17, 7.17 prior to 7.17.10, 7.21 prior to 7.21.4, 8.0 prior to 8.0.3, 8.1 prior to 8.1.3, 8.2 prior to 8.2.2, 8.3 prior to 8.3.1)
No auth needed
Prerequisites:
Publicly accessible Bitbucket instance · At least one public repository on the target instance
nomisec
WORKING POC
8 stars
by walnutsecurity · remote
https://github.com/walnutsecurity/cve-2022-36804
This repository contains a functional Python exploit for CVE-2022-36804, a pre-authentication remote code execution (RCE) vulnerability in Atlassian Bitbucket Server and Data Center. The exploit leverages command injection in multiple API endpoints, demonstrated through a Dockerized vulnerable environment and a Python script that constructs malicious requests to achieve RCE.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center (versions <7.6.17, <7.17.10, <7.21.4, <8.0.3, <8.1.2, <8.2.2, <8.3.1)
No auth needed
Prerequisites:
Network access to the target Bitbucket instance · Python 3.x environment for running the exploit script
nomisec
WORKING POC
7 stars
by ColdFusionX · remote
https://github.com/ColdFusionX/CVE-2022-36804
This repository provides a functional proof-of-concept exploit for CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket Server and Data Center. The exploit leverages malicious HTTP requests to execute arbitrary commands via the `git archive` functionality, demonstrated with payloads for RCE and OOB testing.
Classification
Working Poc 100%
Target:
Atlassian Bitbucket Server and Data Center 7.2.5
No auth needed
Prerequisites:
Access to a public repository or read permissions to a private Bitbucket repository
nomisec
WORKING POC
7 stars
by tahtaciburak · infoleak
https://github.com/tahtaciburak/cve-2022-36804
The repository contains a functional Python script that exploits CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket. The script automates the process of checking for vulnerable endpoints and executing arbitrary commands via crafted API requests.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket
No auth needed
Prerequisites:
Access to the Bitbucket instance · Network connectivity to the target
nomisec
WORKING POC
7 stars
by kljunowsky · remote
https://github.com/kljunowsky/CVE-2022-36804-POC
This repository contains a functional PoC for CVE-2022-36804, an unauthenticated RCE vulnerability in Bitbucket. The exploit constructs malicious archive URLs with command injection payloads to achieve remote code execution.
Classification
Working Poc 95%
Target:
Bitbucket
No auth needed
Prerequisites:
Publicly accessible Bitbucket instance · Target must have vulnerable endpoint exposed
nomisec
WORKING POC
3 stars
by khal4n1 · remote
https://github.com/khal4n1/CVE-2022-36804
The repository contains a functional Python exploit for CVE-2022-36804, targeting Atlassian Bitbucket Server and Data Center. The exploit leverages a command injection vulnerability in the archive endpoint to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center (versions 7.0.0-7.6.16, 7.7.0-7.17.9, 7.18.0-7.21.3, 8.0.0-8.0.2, 8.1.0-8.1.2, 8.2.0-8.2.1, 8.3.0)
No auth needed
Prerequisites:
Publicly accessible Bitbucket instance · Network access to the target
nomisec
SUSPICIOUS
3 stars
by Vulnmachines · remote
https://github.com/Vulnmachines/bitbucket-cve-2022-36804
The repository contains no actual exploit code or technical details, only a screenshot and social media links. It appears to be a lure to drive traffic to external platforms rather than providing a legitimate PoC.
Classification
Suspicious 90%
Target:
Atlassian Bitbucket
No auth needed
nomisec
WORKING POC
3 stars
by Chocapikk · remote-auth
https://github.com/Chocapikk/CVE-2022-36804-ReverseShell
This repository contains a functional exploit for CVE-2022-36804, a critical command injection vulnerability in Bitbucket instances. The exploit automates the discovery of vulnerable repositories and executes arbitrary commands, including reverse shell capabilities.
Classification
Working Poc 95%
Target:
Bitbucket < v8.3.1
No auth needed
Prerequisites:
Public repositories enabled or valid session cookie for private repos
nomisec
WORKING POC
by asepsaepdin · remote-auth
https://github.com/asepsaepdin/CVE-2022-36804
This repository contains a functional Python exploit for CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket Server and Data Center. The exploit leverages multiple API endpoints to achieve remote code execution (RCE) on vulnerable versions.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center (versions 7.0.0-7.6.16, 7.7.0-7.17.9, 7.18.0-7.21.3, 8.0.0-8.0.2, 8.1.0-8.1.2, 8.2.0-8.2.1, 8.3.0)
No auth needed
Prerequisites:
Access to a vulnerable Bitbucket instance · Network connectivity to the target
nomisec
WORKING POC
by imbas007 · remote
https://github.com/imbas007/Atlassian-Bitbucket-CVE-2022-36804
This repository contains a functional Python exploit for CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket Server and Data Center. The exploit constructs a malicious request to the archive API endpoint, allowing remote code execution via command injection.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center <7.6.17, <7.17.10, <7.21.4, <8.0.3, <8.1.2, <8.2.2, and <8.3.1
No auth needed
Prerequisites:
Access to a vulnerable Bitbucket instance · Public or private repository details (if targeting specific repos)
nomisec
WORKING POC
by DanielHallbro · remote
https://github.com/DanielHallbro/CVE-2022-36804-Bitbucket-RCE-Analysis
This repository provides a functional exploit for CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket Server and Data Center. It includes a Docker-based lab environment, detailed technical analysis, and an exploit script to achieve remote command execution via null-byte argument injection in the Git archive command.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center 7.17.1
No auth needed
Prerequisites:
Docker environment · publicly accessible repository on target Bitbucket instance
nomisec
SUSPICIOUS
by devengpk · poc
https://github.com/devengpk/CVE-2022-36804
The repository claims to contain payloads and a full PoC for CVE-2022-36804 (Bitbucket Server/Data Center command injection) but provides no actual exploit code or technical details. The README is vague and lacks depth, resembling a lure for external downloads.
Classification
Suspicious 90%
Target:
Bitbucket Server and Data Center
Auth required
Prerequisites:
Read access to private/public Bitbucket repositories or write access to public repositories
nomisec
SUSPICIOUS
by JRandomSage · poc
https://github.com/JRandomSage/CVE-2022-36804-MASS-RCE
The repository claims to provide a PoC for CVE-2022-36804 but only contains a placeholder Python script that redirects to an external payment link. No actual exploit code or technical details are provided.
Classification
Suspicious 95%
Target:
Atlassian Bitbucket Server and Data Center
No auth needed
Prerequisites:
None provided
nomisec
WORKING POC
by 0xEleven · poc
https://github.com/0xEleven/CVE-2022-36804-ReverseShell
This repository contains a functional exploit for CVE-2022-36804, a critical unauthenticated command injection vulnerability in Bitbucket instances. The exploit automates the discovery of vulnerable repositories and executes arbitrary commands, including reverse shell payloads.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center < v8.3.1
No auth needed
Prerequisites:
Public repositories enabled or valid session cookie for private repos
metasploit
WORKING POC
EXCELLENT
by TheGrandPew, Ron Bowes, Jang, Shelby Pace · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/bitbucket_git_cmd_injection.rb
This Metasploit module exploits CVE-2022-36804, an unauthenticated command injection vulnerability in Bitbucket Server and Data Center. It leverages NULL byte injection in the `/rest/api/latest/projects/{projectKey}/repos/{repositorySlug}/archive` endpoint to execute arbitrary commands via the `git-archive` command.
Classification
Working Poc 100%
Target:
Atlassian Bitbucket Server and Data Center (versions 6.10.17 and later, up to certain patched versions in 7.x and 8.x)
No auth needed
Prerequisites:
Network access to the Bitbucket instance · A publicly accessible repository or valid credentials for a private repository
exploitdb
WORKING POC
by khal4n1 · textwebappspython
https://www.exploit-db.com/exploits/51040
This Python script exploits CVE-2022-36804, a command injection vulnerability in Atlassian Bitbucket Server and Data Center. It crafts a malicious HTTP request to execute arbitrary commands via the archive endpoint, leveraging improper input validation.
Classification
Working Poc 95%
Target:
Atlassian Bitbucket Server and Data Center (versions 7.0.0-7.6.16, 7.7.0-7.17.9, 7.18.0-7.21.3, 8.0.0-8.0.2, 8.1.0-8.1.2, 8.2.0-8.2.1, 8.3.0)
No auth needed
Prerequisites:
Publicly accessible Bitbucket instance · At least one public repository