Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-phmw-jx86-x666

Опубликовано: 16 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Authenticated Rundeck users can view or delete jobs they do not have authorization for.

Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks.

The affected URLs are:

  • http[s]://[host]/context/rdJob/*
  • http[s]://[host]/context/api/*/incubator/jobs

Impact

Rundeck, Process Automation version 4.12.0 up to 4.16.0

Patches

Patched versions: 4.17.3

Workarounds

Access to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level.

  • http[s]://host/context/rdJob/*
  • http[s]://host/context/api/*/incubator/jobs

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

org.rundeck:rundeck

maven
Затронутые версииВерсия исправления

>= 4.12.0, < 4.17.3

4.17.3

EPSS

Процентиль: 46%
0.00235
Низкий

8.1 High

CVSS3

Дефекты

CWE-862

Связанные уязвимости

CVSS3: 8.1
nvd
около 2 лет назад

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. This issue has been addressed in version 4.17.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

EPSS

Процентиль: 46%
0.00235
Низкий

8.1 High

CVSS3

Дефекты

CWE-862