Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-24828
HistoryFeb 07, 2023 - 11:25 p.m.

CVE-2023-24828 Use of Cryptographically Weak Pseudo-Random Number Generator in Onedev

2023-02-0723:25:11
CWE-338
GitHub_M
www.cve.org
3
onedev git-server ci/cd kanban cryptographically-secure vulnerability upgrade-elevate-privilege administrator-permission

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

43.3%

Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "theonedev",
    "product": "onedev",
    "versions": [
      {
        "version": "< 7.9.12",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

43.3%

Related for CVELIST:CVE-2023-24828