Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.rundeck/rundeck
  4. ›
  5. CVE-2020-11009

CVE-2020-11009: Authorization Bypass Through User-Controlled Key

April 29, 2020 (updated September 15, 2021)

In Rundeck before version 3.2.6, authenticated users can craft a request that reveals Execution data and logs and Job details that they are not authorized to see. Depending on the configuration and the way that Rundeck is used, this could result in anything between a high severity risk, or a very low risk. If access is tightly restricted and all users on the system have access to all projects, this is not really much of an issue. If access is wider and allows login for users that do not have access to any projects, or project access is restricted, there is a larger issue. If access is meant to be restricted and secrets, sensitive data, or intellectual property are exposed in Rundeck execution output and job data, the risk becomes much higher. This vulnerability is patched in version 3.2.6

References

  • github.com/advisories/GHSA-5679-7qrc-5m7j
  • github.com/rundeck/rundeck/security/advisories/GHSA-5679-7qrc-5m7j
  • nvd.nist.gov/vuln/detail/CVE-2020-11009

Code Behaviors & Features

Detect and mitigate CVE-2020-11009 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.2.6

Fixed versions

  • 3.2.6

Solution

Upgrade to version 3.2.6 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-639: Authorization Bypass Through User-Controlled Key

Source file

maven/org.rundeck/rundeck/CVE-2020-11009.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:42 +0000.