{ "id": "CVE-2021-41112", "sourceIdentifier": "security-advisories@github.com", "published": "2022-02-28T20:15:08.247", "lastModified": "2022-03-10T16:22:29.847", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds." }, { "lang": "es", "value": "Rundeck es un servicio de automatizaci\u00f3n de c\u00f3digo abierto con una consola web, herramientas de l\u00ednea de comandos y una WebAPI. En versiones anteriores a 3.4.5, los usuarios autenticados pod\u00edan dise\u00f1ar una petici\u00f3n para modificar o eliminar calendarios a nivel de sistema o de proyecto, sin la autorizaci\u00f3n correspondiente. La modificaci\u00f3n o eliminaci\u00f3n de calendarios pod\u00eda causar que los trabajos programados fueran ejecutados, o que no fueran ejecutados en los d\u00edas de calendario deseados. La gravedad depende del nivel confiable de los usuarios autenticados y del impacto de ejecutar o no ejecutar trabajos programados en los d\u00edas regidos por las definiciones de calendario. La versi\u00f3n 3.4.5 contiene un parche para este problema. Actualmente no se presentan medidas de mitigaci\u00f3n conocidas." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.2 }, { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.2 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 5.5 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 4.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-862" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*", "versionEndExcluding": "3.4.5", "matchCriteriaId": "6B775E91-25F2-4A52-B6AC-2D2BF91A8828" } ] } ] } ], "references": [ { "url": "https://github.com/rundeck/rundeck/security/advisories/GHSA-f68p-c9wh-j2q8", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] } ] }