Lucene search

K
cveGitHub_MCVE-2023-48222
HistoryNov 16, 2023 - 10:15 p.m.

CVE-2023-48222

2023-11-1622:15:28
CWE-862
GitHub_M
web.nvd.nist.gov
36
rundeck
automation
web console
command line
webapi
security
vulnerability
cve-2023-48222

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

5.4

Confidence

High

EPSS

0

Percentile

14.0%

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In affected versions access to two URLs used in both Rundeck Open Source and Process Automation products could allow authenticated users to access the URL path, which would allow access to view or delete jobs, without the necessary authorization checks. This issue has been addressed in version 4.17.3. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Vulners
Node
pagerdutyrundeckRange4.12.04.17.3
VendorProductVersionCPE
pagerdutyrundeck*cpe:2.3:a:pagerduty:rundeck:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "rundeck",
    "product": "rundeck",
    "versions": [
      {
        "version": ">= 4.12.0, < 4.17.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

AI Score

5.4

Confidence

High

EPSS

0

Percentile

14.0%