An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can make a POST request, that can cause the server to run untrusted code on Rundeck Enterprise Edition.
The zip-format plugin issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
admin level access to the system resource typeThe ACL Policy yaml file upload issues requires authentication and authorization to these access levels, and affects all Rundeck editions:
create update or admin level access to a project_acl resourcecreate update or admin level access to the system_acl resourceThe unauthorized POST request requires authentication, but no specific authorization, and affects Rundeck Enterprise only.
Versions 3.4.3, 3.3.14
Please visit https://rundeck.com/security for information about specific workarounds.
If you have any questions or comments about this advisory: * Email us at security@rundeck.com
To report security issues to Rundeck please use the form at https://rundeck.com/security
Reporter: Rojan Rijal from Tinder Red Team
{
"github_reviewed_at": "2021-08-30T22:03:16Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-502"
],
"nvd_published_at": "2021-08-30T20:15:00Z",
"severity": "MODERATE"
}