ID CVE-2021-21250
Summary OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file.
References
Vulnerable Configurations
  • cpe:2.3:a:onedev_project:onedev:2.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build118:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build118:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build119:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build119:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build120:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.0:beta_build120:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:2.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:2.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:3.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:3.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:onedev_project:onedev:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:onedev_project:onedev:4.0.2:*:*:*:*:*:*:*
CVSS
Base: 4.0 (as of 21-01-2021 - 14:28)
Impact:
Exploitability:
CWE CWE-538
CAPEC
  • WSDL Scanning
    This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:N/A:N
refmap via4
confirm https://github.com/theonedev/onedev/security/advisories/GHSA-9pph-8gfc-6w2r
misc https://github.com/theonedev/onedev/commit/9196fd795e87dab069b4260a3590a0ea886e770f
Last major update 21-01-2021 - 14:28
Published 15-01-2021 - 21:15
Last modified 21-01-2021 - 14:28
Back to Top