CVE-2021-30482

7.5 HIGH

📋 TL;DR

This vulnerability in JetBrains UpSource allows application passwords to remain valid after they should have been revoked, potentially enabling unauthorized access. It affects organizations using UpSource for code review and collaboration. The issue stems from improper password revocation handling.

💻 Affected Systems

Products:
  • JetBrains UpSource
Versions: All versions before 2020.1.1883
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all UpSource installations with application passwords configured, regardless of deployment method or operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Former employees or attackers with stolen credentials maintain persistent access to source code repositories, enabling intellectual property theft, code manipulation, or further network compromise.

🟠

Likely Case

Unauthorized users access code repositories using previously issued application passwords that should have been revoked, potentially exposing sensitive code or development data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential unauthorized viewing of code repositories, with no escalation or data modification capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of application passwords that should have been revoked but remain active due to the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2020.1.1883 and later

Vendor Advisory: https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/

Restart Required: Yes

Instructions:

1. Download UpSource version 2020.1.1883 or later from JetBrains website. 2. Stop the UpSource service. 3. Backup current installation and data. 4. Install the updated version. 5. Restart the UpSource service. 6. Verify functionality.

🔧 Temporary Workarounds

Manual Password Revocation

all

Manually revoke all existing application passwords and reissue only necessary ones

Access UpSource admin interface > Security > Application Passwords > Revoke All

Network Access Restriction

all

Restrict network access to UpSource instance while awaiting patch

Configure firewall rules to limit access to trusted IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit UpSource access
  • Enable comprehensive logging and monitoring for all UpSource authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check UpSource version in admin interface or via system information. If version is below 2020.1.1883, system is vulnerable.

Check Version:

Check admin dashboard or run: java -jar upsource.jar --version (location varies by installation)

Verify Fix Applied:

After updating, verify version is 2020.1.1883 or higher and test that revoked application passwords no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with revoked passwords
  • Unusual access patterns from unexpected locations or users

Network Indicators:

  • Authentication requests to UpSource API endpoints from unauthorized sources

SIEM Query:

source="upsource" AND (event_type="authentication" AND result="success") | stats count by user, source_ip

🔗 References

📤 Share & Export