156 lines
5.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-41111",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-02-28T20:15:08.160",
"lastModified": "2024-11-21T06:25:29.390",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds."
},
{
"lang": "es",
"value": "Rundeck es un servicio de automatizaci\u00f3n de c\u00f3digo abierto con una consola web, herramientas de l\u00ednea de comandos y una WebAPI. En versiones anteriores a 3.4.5 y 3.3.15, un usuario autenticado con autorizaci\u00f3n para leer webhooks en un proyecto pod\u00eda dise\u00f1ar una petici\u00f3n para revelar definiciones y tokens de webhooks en otro proyecto. El usuario podr\u00eda usar los tokens de webhooks revelados para desencadenar los webhooks. La gravedad depende del nivel confiable de usuarios autenticados y de que se presenten webhooks que desencadenen acciones confidenciales. Se presentan parches para esta vulnerabilidad en las versiones 3.4.5 y 3.3.15. Actualmente no se presentan medidas de mitigaci\u00f3n conocidas.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
2023-04-24 12:24:31 +02:00
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
2023-04-24 12:24:31 +02:00
},
{
"source": "nvd@nist.gov",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
2023-04-24 12:24:31 +02:00
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
2023-04-24 12:24:31 +02:00
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
2023-04-24 12:24:31 +02:00
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"baseScore": 5.5,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
2023-04-24 12:24:31 +02:00
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*",
"versionEndExcluding": "3.3.15",
"matchCriteriaId": "FA2AAF8D-05A6-442F-BDBF-F83D4F3D6D67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*",
"versionStartIncluding": "3.4.0",
"versionEndExcluding": "3.4.5",
"matchCriteriaId": "E121D06A-74E9-4CFC-9AE9-53CDD266CA43"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}