CVE-2021-21249

CRITICAL

OneDev <4.0.3 - RCE

Title source: llm

Description

OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows the instantiation of arbitrary classes. We can leverage that to run arbitrary code by instantiating classes such as `javax.script.ScriptEngineManager` and using `URLClassLoader` to load the script engine provider, resulting in the instantiation of a user controlled class. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by only allowing certain known classes to be deserialized

Scores

CVSS v3 9.6
EPSS 0.0129
EPSS Percentile 79.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Classification

CWE
CWE-502 CWE-74
Status published

Affected Products (1)

onedev_project/onedev < 4.0.3

Timeline

Published Jan 15, 2021
Tracked Since Feb 18, 2026