First published: Mon Feb 28 2022(Updated: )
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pagerduty Rundeck | <3.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-41112 is high with a score of 8.1.
CVE-2021-41112 affects Rundeck versions prior to 3.4.5.
CVE-2021-41112 is a vulnerability in Rundeck that allows authenticated users to modify or delete System or Project level Calendars without appropriate authorization.
CVE-2021-41112 can be exploited by crafting a request to modify or delete Calendars in Rundeck.
Yes, a fix for CVE-2021-41112 is available in Rundeck version 3.4.5.