OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability involving the build endpoint parameters. InputSpec is used to define parameters of a Build spec. It does so by using dynamically generated Groovy classes. A user able to control job parameters can run arbitrary code on OneDev's server by injecting arbitrary Groovy code. The ultimate result is in the injection of a static constructor that will run arbitrary code. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by escaping special characters such as quote from user input.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-01-15T20:10:30
Updated: 2024-08-03T18:09:15.318Z
Reserved: 2020-12-22T00:00:00
Link: CVE-2021-21248
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-01-15T21:15:13.663
Modified: 2024-11-21T05:47:51.593
Link: CVE-2021-21248
Redhat
No data.