CVE-2021-41111

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*
cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
CVSS v2 : 5.5
v3 : 5.4
v2 : 5.5
v3 : 6.4
References () https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5 - Patch, Third Party Advisory () https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5 - Patch, Third Party Advisory
References () https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j - Third Party Advisory () https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j - Third Party Advisory

Information

Published : 2022-02-28 20:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41111

Mitre link : CVE-2021-41111

CVE.ORG link : CVE-2021-41111


JSON object : View

Products Affected

pagerduty

  • rundeck
CWE
CWE-639

Authorization Bypass Through User-Controlled Key