Vulnerability Description
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pagerduty | Rundeck | < 3.3.15 |
Related Weaknesses (CWE)
References
- https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facePatchThird Party Advisory
- https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8jThird Party Advisory
- https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facePatchThird Party Advisory
- https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8jThird Party Advisory
FAQ
What is CVE-2021-41111?
CVE-2021-41111 is a vulnerability with a CVSS score of 6.4 (MEDIUM). Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one p...
How severe is CVE-2021-41111?
CVE-2021-41111 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41111?
Check the references section above for vendor advisories and patch information. Affected products include: Pagerduty Rundeck.