Vulnerability Description
Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Onedev Project | Onedev | < 7.9.12 |
Related Weaknesses (CWE)
References
- https://github.com/theonedev/onedev/commit/d67dd9686897fe5e4ab881d749464aa7c06a6PatchThird Party Advisory
- https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5jThird Party Advisory
- https://github.com/theonedev/onedev/commit/d67dd9686897fe5e4ab881d749464aa7c06a6PatchThird Party Advisory
- https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5jThird Party Advisory
FAQ
What is CVE-2023-24828?
CVE-2023-24828 is a vulnerability with a CVSS score of 8.1 (HIGH). Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing nor...
How severe is CVE-2023-24828?
CVE-2023-24828 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-24828?
Check the references section above for vendor advisories and patch information. Affected products include: Onedev Project Onedev.