CVE-2023-24828

Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the algorithm used to generate access token and password reset keys was not cryptographically secure. Existing normal users (or everyone if it allows self-registration) may exploit this to elevate privilege to obtain administrator permission. This issue is has been addressed in version 7.9.12. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:onedev_project:onedev:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
References () https://github.com/theonedev/onedev/commit/d67dd9686897fe5e4ab881d749464aa7c06a68e5 - Patch, Third Party Advisory () https://github.com/theonedev/onedev/commit/d67dd9686897fe5e4ab881d749464aa7c06a68e5 - Patch, Third Party Advisory
References () https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5j - Third Party Advisory () https://github.com/theonedev/onedev/security/advisories/GHSA-jf5c-9r77-3j5j - Third Party Advisory
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.1

Information

Published : 2023-02-08 00:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24828

Mitre link : CVE-2023-24828

CVE.ORG link : CVE-2023-24828


JSON object : View

Products Affected

onedev_project

  • onedev
CWE
CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)