An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition.
The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
admin
level access to the system
resource typeThe ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
create
update
or admin
level access to a project_acl
resourcecreate
update
or admin
level access to the system_acl
resourceThe unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only.
Versions 3.4.3, 3.3.14
Please visit https://rundeck.com/security for information about specific workarounds.
If you have any questions or comments about this advisory: * Email us at security@rundeck.com
To report security issues to Rundeck please use the form at https://rundeck.com/security
Reporter: Rojan Rijal from Tinder Red Team
{ "nvd_published_at": "2021-08-30T20:15:00Z", "github_reviewed_at": "2021-08-30T22:03:16Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-502" ] }