Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, a user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. Patches are available in Rundeck versions 3.4.3 and 3.3.14.
References
Link | Resource |
---|---|
https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9 | Patch Third Party Advisory |
https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c | Third Party Advisory |
https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9 | Patch Third Party Advisory |
https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 7.2 |
References | () https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9 - Patch, Third Party Advisory | |
References | () https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c - Third Party Advisory |
Information
Published : 2021-08-30 20:15
Updated : 2024-11-21 06:18
NVD link : CVE-2021-39133
Mitre link : CVE-2021-39133
CVE.ORG link : CVE-2021-39133
JSON object : View
Products Affected
pagerduty
- rundeck
CWE
CWE-352
Cross-Site Request Forgery (CSRF)