Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-39132
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-30 Aug, 2021 | 20:15
Updated At-08 Sep, 2021 | 15:08

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to version 3.3.14 and version 3.4.3, an authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition. The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:`admin` level access to the `system` resource type. The ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions: `create` `update` or `admin` level access to a `project_acl` resource, and/or`create` `update` or `admin` level access to the `system_acl` resource. The unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only. Patches are available in versions 3.4.3, 3.3.14

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

pagerduty
pagerduty
>>rundeck>>Versions before 3.3.14(exclusive)
cpe:2.3:a:pagerduty:rundeck:*:*:*:*:community:*:*:*
pagerduty
pagerduty
>>rundeck>>Versions before 3.3.14(exclusive)
cpe:2.3:a:pagerduty:rundeck:*:*:*:*:enterprise:*:*:*
pagerduty
pagerduty
>>rundeck>>Versions from 3.4.0(inclusive) to 3.4.3(exclusive)
cpe:2.3:a:pagerduty:rundeck:*:*:*:*:community:*:*:*
pagerduty
pagerduty
>>rundeck>>Versions from 3.4.0(inclusive) to 3.4.3(exclusive)
cpe:2.3:a:pagerduty:rundeck:*:*:*:*:enterprise:*:*:*
Weaknesses
CWE IDTypeSource
CWE-502Primarynvd@nist.gov
CWE-502Secondarysecurity-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6security-advisories@github.com
Patch
Third Party Advisory
https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pfsecurity-advisories@github.com
Third Party Advisory
Change History
0Changes found

Details not found