CVE-2021-21250
CVSS V2 Medium 4
CVSS V3 Medium 6.5
Description
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file.
Overview
- CVE ID
- CVE-2021-21250
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-01-15T21:15:13
- Last Modified Date
- 2021-01-21T14:28:39
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:onedev_project:onedev:*:*:*:*:*:*:*:* | 1 | OR | 4.0.3 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:N/A:N
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- NONE
- Availability Impact
- NONE
- Base Score
- 4
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- NONE
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://github.com/theonedev/onedev/security/advisories/GHSA-9pph-8gfc-6w2r | Third Party Advisory |
https://github.com/theonedev/onedev/commit/9196fd795e87dab069b4260a3590a0ea886e770f | Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-21250 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21250 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:26:39 | Added to TrackCVE | |||
2022-12-05 20:18:21 | 2021-01-15T21:15Z | 2021-01-15T21:15:13 | CVE Published Date | updated |
2022-12-05 20:18:21 | 2021-01-21T14:28:39 | CVE Modified Date | updated | |
2022-12-05 20:18:21 | Analyzed | Vulnerability Status | updated |