Description
Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. All files in the /opt/onedev/sites/ directory are exposed and can be read by unauthenticated users. This directory contains all projects, including their bare git repos and build artifacts. This file disclosure vulnerability can be used by unauthenticated attackers to leak all project files of any project. Since project IDs are incremental, an attacker could iterate through them and leak all project data. This issue has been resolved in version 7.3.0 and users are advised to upgrade. There are no known workarounds for this issue.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_confirm
https://github.com/theonedev/onedev/security/advisories/GHSA-h427-rv56-c9h2
Patch, Third Party Advisory x_refsource_misc
https://github.com/theonedev/onedev/commit/8aa94e0daf8447cdf76d4f27bfda0a85a7ea5822
Exploit, Third Party Advisory x_refsource_misc
https://blog.sonarsource.com/onedev-remote-code-execution/
Scores
CVSS v3
7.5
EPSS
0.0063
EPSS Percentile
70.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-552
Status
published
Products (1)
onedev_project/onedev
< 7.3.0
Published
Sep 13, 2022
Tracked Since
Feb 18, 2026