logo

CVE-2023-48222 org.rundeck:rundeck

Package

Manager: maven
Name: org.rundeck:rundeck
Vulnerable Version: >=4.12.0 <4.17.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00235 pctl0.46234

Details

Authenticated Rundeck users can view or delete jobs they do not have authorization for. Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. The affected URLs are: - `http[s]://[host]/context/rdJob/*` - `http[s]://[host]/context/api/*/incubator/jobs` ### Impact Rundeck, Process Automation version 4.12.0 up to 4.16.0 ### Patches Patched versions: 4.17.3 ### Workarounds Access to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level. - `http[s]://host/context/rdJob/*` - `http[s]://host/context/api/*/incubator/jobs` ### For more information If you have any questions or comments about this advisory: * Open an issue in [our forums](https://community.pagerduty.com/forum/c/process-automation) * Enterprise Customers can open a [Support ticket](https://support.rundeck.com)

Metadata

Created: 2023-11-16T20:48:46Z
Modified: 2023-11-17T22:04:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-phmw-jx86-x666/GHSA-phmw-jx86-x666.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-phmw-jx86-x666
Finding: F039
Auto approve: 1