CVE-2021-21246
moderate-risk
Published 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/{id}` endpoint there are no security checks enforced so it is possible to retrieve arbitrary user details including their Access Tokens! These access tokens can be used to access the API or clone code in the build spec via the HTTP(S) protocol. It has permissions to all projects accessible by the user account. This issue may lead to `Sensitive data leak` and leak the Access Token which can be used to impersonate the administrator or any other users. This issue was addressed in 4.0.3 by removing user info from restful api.
Do I need to act?
!
24.9% chance of exploitation in next 30 days
EPSS score — higher than 75% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (4)
Third Party Advisory
https://github.com/theonedev/onedev/security/advisories/GHSA-66v7-gg85-f4gx
Third Party Advisory
https://github.com/theonedev/onedev/security/advisories/GHSA-66v7-gg85-f4gx
49
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
15/34 · Moderate
Exposure
5/34 · Minimal