CVE-2023-48222

8.1 HIGH

📋 TL;DR

This vulnerability allows authenticated users in Rundeck to bypass authorization checks and access two specific URLs, enabling them to view or delete jobs without proper permissions. It affects both Rundeck Open Source and Process Automation products. All authenticated users could potentially exploit this flaw.

💻 Affected Systems

Products:
  • Rundeck Open Source
  • Rundeck Process Automation
Versions: All versions before 4.17.3
Operating Systems: All platforms running Rundeck
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with authenticated users. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could delete critical automation jobs, disrupting business operations and causing data loss or service outages.

🟠

Likely Case

Unauthorized viewing of sensitive job configurations and potential deletion of non-critical jobs by users exceeding their intended permissions.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to attempted unauthorized access that could be detected and blocked.

🌐 Internet-Facing: HIGH if Rundeck is exposed to the internet, as any authenticated user could exploit this vulnerability remotely.
🏢 Internal Only: MEDIUM for internal deployments, as exploitation still requires authenticated access but could be used for privilege escalation or data exfiltration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.17.3

Vendor Advisory: https://github.com/rundeck/rundeck/security/advisories/GHSA-phmw-jx86-x666

Restart Required: Yes

Instructions:

1. Backup your Rundeck configuration and data. 2. Stop the Rundeck service. 3. Upgrade to version 4.17.3 using your package manager or manual installation. 4. Restart the Rundeck service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Restrict access to Rundeck to only trusted, necessary users and implement strict authentication requirements.
  • Implement enhanced monitoring and alerting for unauthorized job access or deletion attempts.

🔍 How to Verify

Check if Vulnerable:

Check your Rundeck version via the web interface or by running 'rundeckd --version' on the server. If version is below 4.17.3, you are vulnerable.

Check Version:

rundeckd --version

Verify Fix Applied:

After upgrading, verify the version is 4.17.3 or higher and test that authenticated users cannot access unauthorized job management URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to job management URLs
  • Job deletion or viewing by users without proper permissions

Network Indicators:

  • HTTP requests to specific vulnerable URLs by authenticated users

SIEM Query:

source="rundeck" AND (url_path="/api/XX/jobs" OR url_path="/api/YY/jobs") AND user!="authorized_user"

🔗 References

📤 Share & Export