Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which provides a list of job names and groups for any project, without the necessary authorization checks. The output of these endpoints only exposes the name of job groups and the jobs contained within the specified project. The output is read-only and the access does not allow changes to the information. This vulnerability has been patched in version 4.17.3. Users are advised to upgrade. Users unable to upgrade may block access to the two URLs used in either Rundeck Open Source or Process Automation products at a load balancer level.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-3065 Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which provides a list of job names and groups for any project, without the necessary authorization checks. The output of these endpoints only exposes the name of job groups and the jobs contained within the specified project. The output is read-only and the access does not allow changes to the information. This vulnerability has been patched in version 4.17.3. Users are advised to upgrade. Users unable to upgrade may block access to the two URLs used in either Rundeck Open Source or Process Automation products at a load balancer level.
Github GHSA Github GHSA GHSA-xvmv-4rx6-x6jx Authenticated users can view job names and groups they do not have authorization to view
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-29T14:48:58.458Z

Reserved: 2023-10-30T19:57:51.673Z

Link: CVE-2023-47112

cve-icon Vulnrichment

Updated: 2024-08-02T21:01:22.807Z

cve-icon NVD

Status : Modified

Published: 2023-11-16T22:15:28.157

Modified: 2024-11-21T08:29:48.123

Link: CVE-2023-47112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.