org.rundeck:rundeck@3.4.0-20210614 vulnerabilities

  • latest version

    5.13.0-20250625

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    25 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.rundeck:rundeck package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Information Exposure

    org.rundeck:rundeck is an enable Self-Service Operations package which gives specific users access to your existing tools, services, and scripts.

    Affected versions of this package are vulnerable to Information Exposure. The Key Storage converter plugin mechanism was not enabled correctly, resulting in the use of the encryption layer for Key Storage possibly not working. Exploiting this vulnerability leads to any credentials created or overwritten being written in plaintext to the backend storage.

    Note: This vulnerability affects those using any Storage Converter plugin.

    How to fix Information Exposure?

    Upgrade org.rundeck:rundeck to version 4.2.2-20220615, 4.3.1-20220615 or higher.

    [,4.2.2-20220615)[4.3.0-20220602,4.3.1-20220615)
    • H
    Cross-site Request Forgery (CSRF)

    org.rundeck:rundeck is an enable Self-Service Operations package which gives specific users access to your existing tools, services, and scripts.

    Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). A user with admin access to the system resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code, due to missing CSRF protection to the upload/install plugin endpoints.

    How to fix Cross-site Request Forgery (CSRF)?

    Upgrade org.rundeck:rundeck to version 3.3.14, 3.4.3 or higher.

    [0,3.3.14)[3.4.0,3.4.3)