<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bitbucket Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/bitbucket-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Apr 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/bitbucket-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>Bitbucket Repository Exempted from Secret Scanning</title><link>https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-exempt/</link><pubDate>Mon, 29 Apr 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-04-bitbucket-secret-scanning-exempt/</guid><description>An attacker may attempt to disable or bypass secret scanning on a Bitbucket repository to avoid detection of committed secrets, potentially leading to credential compromise and subsequent unauthorized access.</description><content:encoded><![CDATA[<p>Attackers can weaken an organization&rsquo;s security posture by disabling or bypassing security controls within Bitbucket. This allows sensitive information, such as API keys, passwords, and other credentials, to be committed to the repository without detection. By adding a repository to the secret scanning exemption list, attackers can effectively disable a key preventative measure, making it easier to introduce and maintain compromised credentials within the codebase. This can lead to unauthorized access, data breaches, and other serious security incidents. This technique allows attackers to impair defenses, avoiding detection of secrets being committed to the repository.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a Bitbucket account with repository administration privileges.</li>
<li>The attacker navigates to the repository settings within Bitbucket.</li>
<li>The attacker accesses the secret scanning configuration for the repository.</li>
<li>The attacker identifies the option to add the repository to the exemption list for secret scanning.</li>
<li>The attacker adds the repository to the exemption list, effectively disabling secret scanning for that repository.</li>
<li>The attacker commits sensitive information (secrets, credentials) to the now-exempt repository.</li>
<li>The secrets are committed without triggering secret scanning alerts.</li>
<li>The attacker uses the committed secrets to gain unauthorized access to other systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising secrets within a Bitbucket repository can lead to a variety of negative consequences, including unauthorized access to sensitive data, compromised infrastructure, and data breaches. While the exact number of affected organizations is unknown, the potential impact is significant for any organization using Bitbucket to store code and manage secrets. Successful exploitation allows attackers to move laterally within the network and escalate privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Bitbucket Secret Scanning Exempt Repository Added&rdquo; to your SIEM to detect when a repository is added to the secret scanning exemption list (logsource: bitbucket).</li>
<li>Investigate any detected instances of repositories being added to the secret scanning exemption list to determine if the change was authorized.</li>
<li>Ensure that appropriate access controls are in place to prevent unauthorized users from modifying repository settings.</li>
<li>Review Bitbucket audit logs regularly to identify suspicious activity related to secret scanning configuration changes (logsource: bitbucket).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.defense-impairment</category><category>attack.t1685</category><category>bitbucket</category></item></channel></rss>