{"api_version":"1","generated_at":"2026-04-23T08:15:26+00:00","cve":"CVE-2021-41111","urls":{"html":"https://cve.report/CVE-2021-41111","api":"https://cve.report/api/cve/CVE-2021-41111.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41111","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41111"},"summary":{"title":"CVE-2021-41111","description":"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-02-28 20:15:00","updated_at":"2022-03-10 16:51:00"},"problem_types":["CWE-639"],"metrics":[],"references":[{"url":"https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5","name":"https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-mfqj-f22m-gv8j · rundeck/rundeck@a3bdc06 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j","name":"https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j","refsource":"CONFIRM","tags":[],"title":"Webhook data and tokens can be revealed to an unauthorized user · Advisory · rundeck/rundeck · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41111","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41111","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41111","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pagerduty","cpe5":"rundeck","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41111","STATE":"PUBLIC","TITLE":"Authorization Bypass Through User-Controlled Key in Rundeck"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"rundeck","version":{"version_data":[{"version_value":"< 3.3.15"},{"version_value":">= 3.4.0, < 3.4.5"}]}}]},"vendor_name":"rundeck"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definitions and tokens in another project. The user could use the revealed webhook tokens to trigger webhooks. Severity depends on trust level of authenticated users and whether any webhooks exist that trigger sensitive actions. There are patches for this vulnerability in versions 3.4.5 and 3.3.15. There are currently no known workarounds."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-639: Authorization Bypass Through User-Controlled Key"}]}]},"references":{"reference_data":[{"name":"https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j","refsource":"CONFIRM","url":"https://github.com/rundeck/rundeck/security/advisories/GHSA-mfqj-f22m-gv8j"},{"name":"https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5","refsource":"MISC","url":"https://github.com/rundeck/rundeck/commit/a3bdc06a0731da902593732022a5b9d2b4facec5"}]},"source":{"advisory":"GHSA-mfqj-f22m-gv8j","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-02-28 20:15:00","lastModifiedDate":"2022-03-10 16:51:00","problem_types":["CWE-639"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.5},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*","versionStartIncluding":"3.4.0","versionEndExcluding":"3.4.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pagerduty:rundeck:*:*:*:*:-:*:*:*","versionEndExcluding":"3.3.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41111","Ordinal":"216934","Title":"CVE-2021-41111","CVE":"CVE-2021-41111","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41111","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}