Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21250— Post-Auth External Entity Expansion (XXE)

CVSS 7.7 · High EPSS 0.29% · P52
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-21250

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Post-Auth External Entity Expansion (XXE)
Source: NVD (National Vulnerability Database)
Vulnerability Description
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML document without preventing the expansion of external entities. These entities can be configured to read arbitrary files from the file system and dump their contents in the final XML document to be migrated. If the files are dumped in properties included in the YAML file, it will be possible for an attacker to read them. If not, it is possible for an attacker to exfiltrate the contents of these files Out Of Band. This issue was addressed in 4.0.3 by ignoring ENTITY instructions in xml file.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
文件和路径信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Theonedev Onedev 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Theonedev Onedev是Theonedev团队的一个基于JAVA的多合一DevOps平台。该平台支持容器构建、编排、CI、Git管理、团队协作等功能,帮助开发者构建一个简单、功能强大的开发平台。 OneDev before version 4.0.3 存在安全漏洞,攻击者可利用该漏洞从文件系统中读取任意文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
theonedevonedev < 4.0.3 -

II. Public POCs for CVE-2021-21250

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-21250

登录查看更多情报信息。

Same Patch Batch · theonedev · 2021-01-15 · 10 CVEs total

CVE-2021-2124210.0 CRITICALPre-Auth Unsafe Deserialization on AttachmentUploadServet
CVE-2021-2124310.0 CRITICALPre-Auth Unsafe Deserialization on KubernetesResource
CVE-2021-2124410.0 CRITICALPre-Auth SSTI via Bean validation message tampering
CVE-2021-2124510.0 CRITICALPre-Auth Arbitrary File Upload
CVE-2021-212479.6 CRITICALPost-Auth Unsafe Deserialization on BasePage (AJAX)
CVE-2021-212489.6 CRITICALPost-Auth Arbitrary Code execution via Groovy script injection
CVE-2021-212499.6 CRITICALPost-Auth Unsafe Yaml deserialization
CVE-2021-212468.6 HIGHPre-Auth Access token leak
CVE-2021-212517.7 HIGHZipSlip Arbitrary File Upload

IV. Related Vulnerabilities

V. Comments for CVE-2021-21250

No comments yet


Leave a comment