CVE-2022-39208: CWE-552: Files or Directories Accessible to External Parties in theonedev onedev
Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. All files in the /opt/onedev/sites/ directory are exposed and can be read by unauthenticated users. This directory contains all projects, including their bare git repos and build artifacts. This file disclosure vulnerability can be used by unauthenticated attackers to leak all project files of any project. Since project IDs are incremental, an attacker could iterate through them and leak all project data. This issue has been resolved in version 7.3.0 and users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-39208 is a file disclosure vulnerability affecting versions of Onedev prior to 7.3.0. Onedev is an open source, self-hosted Git server that integrates CI/CD and Kanban functionalities, widely used for managing software development projects. The vulnerability arises because all files located in the /opt/onedev/sites/ directory are accessible and readable by unauthenticated users. This directory contains all project data, including bare Git repositories and build artifacts. Due to the incremental nature of project IDs, an attacker can enumerate project directories systematically and exfiltrate the contents of all projects hosted on the server without any authentication or user interaction. This exposure compromises the confidentiality of source code, build outputs, and potentially sensitive project metadata. The flaw is categorized under CWE-552, indicating files or directories accessible to external parties. The issue was resolved in Onedev version 7.3.0, and no known workarounds exist, making upgrading the only effective remediation. There are no known exploits in the wild at this time, but the vulnerability's nature makes it a significant risk for organizations relying on Onedev for source code management and CI/CD pipelines.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to intellectual property and operational security. Unauthorized disclosure of source code and build artifacts can lead to competitive disadvantage, exposure of proprietary algorithms, and leakage of sensitive configuration or credential files embedded in repositories. Additionally, attackers could analyze build artifacts to identify vulnerabilities or backdoors, facilitating further attacks. The unauthenticated nature of the exploit means that any external attacker scanning for vulnerable Onedev instances can access critical project data without needing credentials or user interaction. This could lead to data breaches, regulatory non-compliance (especially under GDPR if personal data is embedded in repositories), and reputational damage. Organizations using Onedev for critical infrastructure or government projects in Europe could face heightened risks, including espionage or sabotage. The lack of known exploits in the wild reduces immediate threat but does not diminish the urgency to patch, given the ease of exploitation and potential for automated scanning and data exfiltration.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade Onedev installations to version 7.3.0 or later, where the vulnerability has been fixed. Organizations should audit their current Onedev versions and plan immediate upgrades. Since no workarounds exist, temporary mitigations such as network segmentation or firewall rules restricting access to the /opt/onedev/sites/ directory may reduce exposure but are not substitutes for patching. It is also recommended to conduct a thorough review of logs and access records to detect any unauthorized access attempts prior to patching. Implementing strict access controls and monitoring on the server hosting Onedev can help detect anomalous activities. Additionally, organizations should consider encrypting sensitive repositories and artifacts at rest and in transit to add layers of defense. Regular vulnerability scanning and asset inventory updates will help identify any remaining vulnerable instances. Finally, educating development and operations teams about the importance of timely patching and secure configuration management is crucial to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2022-39208: CWE-552: Files or Directories Accessible to External Parties in theonedev onedev
Description
Onedev is an open source, self-hosted Git Server with CI/CD and Kanban. All files in the /opt/onedev/sites/ directory are exposed and can be read by unauthenticated users. This directory contains all projects, including their bare git repos and build artifacts. This file disclosure vulnerability can be used by unauthenticated attackers to leak all project files of any project. Since project IDs are incremental, an attacker could iterate through them and leak all project data. This issue has been resolved in version 7.3.0 and users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-39208 is a file disclosure vulnerability affecting versions of Onedev prior to 7.3.0. Onedev is an open source, self-hosted Git server that integrates CI/CD and Kanban functionalities, widely used for managing software development projects. The vulnerability arises because all files located in the /opt/onedev/sites/ directory are accessible and readable by unauthenticated users. This directory contains all project data, including bare Git repositories and build artifacts. Due to the incremental nature of project IDs, an attacker can enumerate project directories systematically and exfiltrate the contents of all projects hosted on the server without any authentication or user interaction. This exposure compromises the confidentiality of source code, build outputs, and potentially sensitive project metadata. The flaw is categorized under CWE-552, indicating files or directories accessible to external parties. The issue was resolved in Onedev version 7.3.0, and no known workarounds exist, making upgrading the only effective remediation. There are no known exploits in the wild at this time, but the vulnerability's nature makes it a significant risk for organizations relying on Onedev for source code management and CI/CD pipelines.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to intellectual property and operational security. Unauthorized disclosure of source code and build artifacts can lead to competitive disadvantage, exposure of proprietary algorithms, and leakage of sensitive configuration or credential files embedded in repositories. Additionally, attackers could analyze build artifacts to identify vulnerabilities or backdoors, facilitating further attacks. The unauthenticated nature of the exploit means that any external attacker scanning for vulnerable Onedev instances can access critical project data without needing credentials or user interaction. This could lead to data breaches, regulatory non-compliance (especially under GDPR if personal data is embedded in repositories), and reputational damage. Organizations using Onedev for critical infrastructure or government projects in Europe could face heightened risks, including espionage or sabotage. The lack of known exploits in the wild reduces immediate threat but does not diminish the urgency to patch, given the ease of exploitation and potential for automated scanning and data exfiltration.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade Onedev installations to version 7.3.0 or later, where the vulnerability has been fixed. Organizations should audit their current Onedev versions and plan immediate upgrades. Since no workarounds exist, temporary mitigations such as network segmentation or firewall rules restricting access to the /opt/onedev/sites/ directory may reduce exposure but are not substitutes for patching. It is also recommended to conduct a thorough review of logs and access records to detect any unauthorized access attempts prior to patching. Implementing strict access controls and monitoring on the server hosting Onedev can help detect anomalous activities. Additionally, organizations should consider encrypting sensitive repositories and artifacts at rest and in transit to add layers of defense. Regular vulnerability scanning and asset inventory updates will help identify any remaining vulnerable instances. Finally, educating development and operations teams about the importance of timely patching and secure configuration management is crucial to prevent similar issues.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6989
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 11:31:48 PM
Last updated: 7/26/2025, 5:26:08 PM
Views: 12
Related Threats
CVE-2025-55164: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in helmetjs content-security-policy-parser
HighCVE-2025-3089: CWE-639 Authorization Bypass Through User-Controlled Key in ServiceNow ServiceNow AI Platform
MediumCVE-2025-54864: CWE-306: Missing Authentication for Critical Function in NixOS hydra
MediumCVE-2025-54800: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NixOS hydra
HighCVE-2025-8452: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in Brother Industries, Ltd HL-L8260CDN
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.