First published: Mon Feb 28 2022(Updated: )
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pagerduty Rundeck | <3.3.15 | |
Pagerduty Rundeck | >=3.4.0<3.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41111 is a vulnerability in Rundeck that allows an authenticated user to reveal Webhook definitions and tokens in another project.
CVE-2021-41111 has a severity level of 5.4, which is considered medium.
Versions prior to 3.4.5 and 3.3.15 of Rundeck are affected by CVE-2021-41111.
An authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project.
Yes, upgrading Rundeck to version 3.4.5 or 3.3.15 will fix the vulnerability.