// For flags

CVE-2021-41111

Authorization Bypass Through User-Controlled Key in Rundeck

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.

Rundeck es un servicio de automatización de código abierto con una consola web, herramientas de línea de comandos y una WebAPI. En versiones anteriores a 3.4.5 y 3.3.15, un usuario autenticado con autorización para leer webhooks en un proyecto podía diseñar una petición para revelar definiciones y tokens de webhooks en otro proyecto. El usuario podría usar los tokens de webhooks revelados para desencadenar los webhooks. La gravedad depende del nivel confiable de usuarios autenticados y de que se presenten webhooks que desencadenen acciones confidenciales. Se presentan parches para esta vulnerabilidad en las versiones 3.4.5 y 3.3.15. Actualmente no se presentan medidas de mitigación conocidas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-09-15 CVE Reserved
  • 2022-02-28 CVE Published
  • 2023-09-21 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pagerduty
Search vendor "Pagerduty"
Rundeck
Search vendor "Pagerduty" for product "Rundeck"
< 3.3.15
Search vendor "Pagerduty" for product "Rundeck" and version " < 3.3.15"
-
Affected
Pagerduty
Search vendor "Pagerduty"
Rundeck
Search vendor "Pagerduty" for product "Rundeck"
>= 3.4.0 < 3.4.5
Search vendor "Pagerduty" for product "Rundeck" and version " >= 3.4.0 < 3.4.5"
-
Affected