CVE-2023-48222 – org.rundeck:rundeck
Package
Manager: maven
Name: org.rundeck:rundeck
Vulnerable Version: >=4.12.0 <4.17.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00235 pctl0.46234
Details
Authenticated Rundeck users can view or delete jobs they do not have authorization for. Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. The affected URLs are: - `http[s]://[host]/context/rdJob/*` - `http[s]://[host]/context/api/*/incubator/jobs` ### Impact Rundeck, Process Automation version 4.12.0 up to 4.16.0 ### Patches Patched versions: 4.17.3 ### Workarounds Access to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level. - `http[s]://host/context/rdJob/*` - `http[s]://host/context/api/*/incubator/jobs` ### For more information If you have any questions or comments about this advisory: * Open an issue in [our forums](https://community.pagerduty.com/forum/c/process-automation) * Enterprise Customers can open a [Support ticket](https://support.rundeck.com)
Metadata
Created: 2023-11-16T20:48:46Z
Modified: 2023-11-17T22:04:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-phmw-jx86-x666/GHSA-phmw-jx86-x666.json
CWE IDs: ["CWE-862"]
Alternative ID: GHSA-phmw-jx86-x666
Finding: F039
Auto approve: 1