CVE-2021-21249
CRITICALOneDev <4.0.3 - RCE
Title source: llmDescription
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows the instantiation of arbitrary classes. We can leverage that to run arbitrary code by instantiating classes such as `javax.script.ScriptEngineManager` and using `URLClassLoader` to load the script engine provider, resulting in the instantiation of a user controlled class. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by only allowing certain known classes to be deserialized
Scores
CVSS v3
9.6
EPSS
0.0129
EPSS Percentile
79.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Classification
CWE
CWE-502
CWE-74
Status
published
Affected Products (1)
onedev_project/onedev
< 4.0.3
Timeline
Published
Jan 15, 2021
Tracked Since
Feb 18, 2026