GHSA-phmw-jx86-x666

Suggest an improvement
Source
https://github.com/advisories/GHSA-phmw-jx86-x666
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-phmw-jx86-x666/GHSA-phmw-jx86-x666.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-phmw-jx86-x666
Aliases
  • CVE-2023-48222
Published
2023-11-16T20:48:46Z
Modified
2023-11-17T22:15:53.593273Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Authenticated Rundeck users can view or delete jobs they do not have authorization for.
Details

Access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks.

The affected URLs are: - http[s]://[host]/context/rdJob/* - http[s]://[host]/context/api/*/incubator/jobs

Impact

Rundeck, Process Automation version 4.12.0 up to 4.16.0

Patches

Patched versions: 4.17.3

Workarounds

Access to two URLs used in either Rundeck Open Source or Process Automation products could be blocked at a load balancer level. - http[s]://host/context/rdJob/* - http[s]://host/context/api/*/incubator/jobs

For more information

If you have any questions or comments about this advisory: * Open an issue in our forums * Enterprise Customers can open a Support ticket

Database specific
{
    "nvd_published_at": "2023-11-16T22:15:28Z",
    "cwe_ids": [
        "CWE-862"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-11-16T20:48:46Z"
}
References

Affected packages

Maven / org.rundeck:rundeck

Package

Name
org.rundeck:rundeck
View open source insights on deps.dev
Purl
pkg:maven/org.rundeck/rundeck

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.12.0
Fixed
4.17.3

Affected versions

4.*

4.13.0-20230515
4.14.0-rc1-20230606
4.14.0-20230615
4.14.1-rc2-20230621
4.14.1-20230622
4.14.2-20230713
4.15.0-rc1-20230714
4.15.0-20230725
4.16.0-rc1-20230815
4.16.0-20230825
4.17.1-rc1-20231009
4.17.1-20231018
4.17.2-rc1-20231025
4.17.2-20231107