Skip to content

BitBucket Pipelines Configuration Exposure

ID: bitbucket-pipelines

Severity: info

Author: DhiyaneshDK

Tags: exposure,bitbucket,devops,cicd,files

id: bitbucket-pipelines
info:
name: BitBucket Pipelines Configuration Exposure
author: DhiyaneshDK
severity: info
classification:
cpe: cpe:2.3:a:atlassian:bitbucket:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: atlassian
product: bitbucket
shodan-query: html:"bitbucket-pipelines.yml"
tags: exposure,bitbucket,devops,cicd,files
http:
- method: GET
path:
- "{{BaseURL}}/bitbucket-pipelines.yml"
matchers-condition: and
matchers:
- type: word
words:
- 'pipelines:'
- 'step:'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100985685b35bff89a20739a66cb687333c0886634d138861d346595275b9539359022100c29bce73d1d4dacd1ad0be8b775750305445d13263bce578d92ff3c6cd342d7d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/bitbucket-pipelines.yaml"

View on Github