Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/theonedev/onedev/commit/d67dd9686897fe5e4ab881d749464aa7c06a68e5 | Patch Third Party Advisory |
https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5j | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-02-08 00:15
Updated : 2024-02-28 19:51
NVD link : CVE-2023-24828
Mitre link : CVE-2023-24828
CVE.ORG link : CVE-2023-24828
JSON object : View
Products Affected
onedev_project
- onedev
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)