{ "id": "CVE-2020-11009", "sourceIdentifier": "security-advisories@github.com", "published": "2020-04-29T17:15:11.880", "lastModified": "2021-09-14T14:01:53.460", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In Rundeck before version 3.2.6, authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. This vulnerability is patched in version 3.2.6" }, { "lang": "es", "value": "En Rundeck versiones anteriores a 3.2.6, los usuarios autenticados pueden dise\u00f1ar una petici\u00f3n que revele datos y registros de Ejecuci\u00f3n y detalles del trabajo que no est\u00e1n autorizados a visualizar. Dependiendo de la configuraci\u00f3n y la manera en que Rundeck es usada, esto podr\u00eda resultar en alg\u00fan riesgo de gravedad alto o muy bajo. Si el acceso est\u00e1 herm\u00e9ticamente restringido y todos los usuarios del sistema poseen acceso a todos los proyectos, esto no es realmente un problema. Si el acceso es m\u00e1s amplio y permite el inicio de sesi\u00f3n a los usuarios que no tienen acceso a ning\u00fan proyecto, o el acceso al proyecto est\u00e1 restringido, se presenta un problema mayor. Si el acceso est\u00e1 destinado a ser restringido y los secretos, los datos confidenciales o la propiedad intelectual est\u00e1n expuestos en la salida de ejecuci\u00f3n de Rundeck y en los datos del trabajo, el riesgo es mucho mayor. Esta vulnerabilidad se parche\u00f3 en la versi\u00f3n 3.2.6" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 }, { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-639" } ] }, { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.2.6", "matchCriteriaId": "4A327F69-D7E6-4E66-AFBF-AD7C96833083" } ] } ] } ], "references": [ { "url": "https://docs.rundeck.com/docs/history/3_2_x/version-3.2.6.html", "source": "security-advisories@github.com", "tags": [ "Release Notes", "Vendor Advisory" ] }, { "url": "https://github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] } ] }