Vulnerability Details CVE-2021-32651
OneDev is a development operations platform. If the LDAP external authentication mechanism is enabled in OneDev versions 4.4.1 and prior, an attacker can manipulate a user search filter to send forged queries to the application and explore the LDAP tree using Blind LDAP Injection techniques. The specific payload depends on how the User Search Filter property is configured in OneDev. This issue was fixed in version 4.4.2.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 47.9%
CVSS Severity
CVSS v3 Score 3.1
CVSS v2 Score 4.3
Products affected by CVE-2021-32651
-
cpe:2.3:a:onedev_project:onedev:2.0.0
-
cpe:2.3:a:onedev_project:onedev:2.0.1
-
cpe:2.3:a:onedev_project:onedev:2.0.2
-
cpe:2.3:a:onedev_project:onedev:2.0.3
-
cpe:2.3:a:onedev_project:onedev:2.0.4
-
cpe:2.3:a:onedev_project:onedev:2.0.5
-
cpe:2.3:a:onedev_project:onedev:2.0.6
-
cpe:2.3:a:onedev_project:onedev:2.0.7
-
cpe:2.3:a:onedev_project:onedev:2.0.8
-
cpe:2.3:a:onedev_project:onedev:3.0.10
-
cpe:2.3:a:onedev_project:onedev:3.0.11
-
cpe:2.3:a:onedev_project:onedev:3.0.12
-
cpe:2.3:a:onedev_project:onedev:3.0.13
-
cpe:2.3:a:onedev_project:onedev:3.0.14
-
cpe:2.3:a:onedev_project:onedev:3.0.4
-
cpe:2.3:a:onedev_project:onedev:3.0.5
-
cpe:2.3:a:onedev_project:onedev:3.0.6
-
cpe:2.3:a:onedev_project:onedev:3.0.7
-
cpe:2.3:a:onedev_project:onedev:3.0.8
-
cpe:2.3:a:onedev_project:onedev:3.0.9
-
cpe:2.3:a:onedev_project:onedev:3.1.0
-
cpe:2.3:a:onedev_project:onedev:3.1.1
-
cpe:2.3:a:onedev_project:onedev:3.1.2
-
cpe:2.3:a:onedev_project:onedev:3.2.0
-
cpe:2.3:a:onedev_project:onedev:3.2.1
-
cpe:2.3:a:onedev_project:onedev:3.2.2
-
cpe:2.3:a:onedev_project:onedev:3.2.3
-
cpe:2.3:a:onedev_project:onedev:3.2.4
-
cpe:2.3:a:onedev_project:onedev:3.2.5
-
cpe:2.3:a:onedev_project:onedev:3.2.6
-
cpe:2.3:a:onedev_project:onedev:3.2.7
-
cpe:2.3:a:onedev_project:onedev:3.2.8
-
cpe:2.3:a:onedev_project:onedev:3.2.9
-
cpe:2.3:a:onedev_project:onedev:4.0.0
-
cpe:2.3:a:onedev_project:onedev:4.0.1
-
cpe:2.3:a:onedev_project:onedev:4.0.2
-
cpe:2.3:a:onedev_project:onedev:4.0.3
-
cpe:2.3:a:onedev_project:onedev:4.0.4
-
cpe:2.3:a:onedev_project:onedev:4.0.5
-
cpe:2.3:a:onedev_project:onedev:4.0.6
-
cpe:2.3:a:onedev_project:onedev:4.0.7
-
cpe:2.3:a:onedev_project:onedev:4.0.8
-
cpe:2.3:a:onedev_project:onedev:4.0.9
-
cpe:2.3:a:onedev_project:onedev:4.1.0
-
cpe:2.3:a:onedev_project:onedev:4.1.2
-
cpe:2.3:a:onedev_project:onedev:4.1.3
-
cpe:2.3:a:onedev_project:onedev:4.1.4
-
cpe:2.3:a:onedev_project:onedev:4.1.5
-
cpe:2.3:a:onedev_project:onedev:4.1.6
-
cpe:2.3:a:onedev_project:onedev:4.2.0
-
cpe:2.3:a:onedev_project:onedev:4.2.1
-
cpe:2.3:a:onedev_project:onedev:4.2.2
-
cpe:2.3:a:onedev_project:onedev:4.2.3
-
cpe:2.3:a:onedev_project:onedev:4.2.4
-
cpe:2.3:a:onedev_project:onedev:4.2.5
-
cpe:2.3:a:onedev_project:onedev:4.3.0
-
cpe:2.3:a:onedev_project:onedev:4.3.1
-
cpe:2.3:a:onedev_project:onedev:4.3.2
-
cpe:2.3:a:onedev_project:onedev:4.3.3
-
cpe:2.3:a:onedev_project:onedev:4.3.4
-
cpe:2.3:a:onedev_project:onedev:4.3.5
-
cpe:2.3:a:onedev_project:onedev:4.4.0
-
cpe:2.3:a:onedev_project:onedev:4.4.1