Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5 | Patch Third Party Advisory |
https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j | Third Party Advisory |
https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5 | Patch Third Party Advisory |
https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 6.4 |
References | () https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5 - Patch, Third Party Advisory | |
References | () https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j - Third Party Advisory |
Information
Published : 2022-02-28 20:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41111
Mitre link : CVE-2021-41111
CVE.ORG link : CVE-2021-41111
JSON object : View
Products Affected
pagerduty
- rundeck
CWE
CWE-639
Authorization Bypass Through User-Controlled Key