CVE-2021-41112
📋 TL;DR
This vulnerability allows authenticated Rundeck users to modify or delete system or project calendars without proper authorization. This could cause scheduled jobs to execute or not execute on unintended days, potentially disrupting automation workflows. All Rundeck instances with authenticated users are affected.
💻 Affected Systems
- Rundeck
📦 What is this software?
Rundeck by Pagerduty
⚠️ Risk & Real-World Impact
Worst Case
Critical scheduled jobs (like backups, security scans, or production deployments) could be triggered at wrong times or prevented from running, causing data loss, security gaps, or operational disruption.
Likely Case
Unauthorized calendar modifications lead to job scheduling errors, causing automation failures, missed maintenance tasks, or unexpected job executions that impact system reliability.
If Mitigated
With proper access controls and monitoring, impact is limited to minor scheduling disruptions that can be quickly detected and corrected.
🎯 Exploit Status
Exploitation requires authenticated access; attackers need valid credentials to exploit this authorization bypass.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.5
Vendor Advisory: https://github.com/rundeck/rundeck/security/advisories/GHSA-f68p-c9wh-j2q8
Restart Required: Yes
Instructions:
1. Backup Rundeck configuration and data. 2. Stop Rundeck service. 3. Upgrade to version 3.4.5 or later. 4. Restart Rundeck service. 5. Verify functionality.
🔧 Temporary Workarounds
No known workarounds
allThe vendor advisory states there are no known workarounds for this vulnerability.
🧯 If You Can't Patch
- Restrict authenticated user access to only trusted personnel with minimal necessary permissions.
- Implement enhanced monitoring of calendar modifications and job execution logs for anomalous activity.
🔍 How to Verify
Check if Vulnerable:
Check Rundeck version via web interface or configuration files; versions below 3.4.5 are vulnerable.
Check Version:
rundeckd version
Verify Fix Applied:
Confirm Rundeck version is 3.4.5 or higher and test that authenticated users cannot modify calendars without proper authorization.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized calendar modification attempts in Rundeck audit logs
- Unexpected job executions or missed scheduled jobs
Network Indicators:
- HTTP requests to calendar API endpoints from unauthorized users
SIEM Query:
source="rundeck" AND (event_type="calendar_modification" OR event_type="job_execution") AND user NOT IN [authorized_users]