CVE-2021-41112: CWE-862: Missing Authorization in rundeck rundeck
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.
AI Analysis
Technical Summary
CVE-2021-41112 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting Rundeck, an open-source automation service widely used for orchestrating scheduled jobs via a web console, command line tools, and WebAPI. The vulnerability exists in Rundeck versions prior to 3.4.5 and allows any authenticated user to craft specially designed requests to modify or delete System or Project level Calendars without proper authorization checks. Calendars in Rundeck define specific days on which scheduled jobs should or should not run. By exploiting this flaw, an attacker with valid authentication can alter calendar configurations, potentially causing scheduled jobs to execute on unintended days or fail to execute on intended days. The impact of this vulnerability is context-dependent, relying heavily on the trust level of the authenticated user and the criticality of the scheduled jobs governed by these calendars. For example, if critical operational or security tasks are scheduled based on these calendars, their disruption could lead to operational outages, security lapses, or data integrity issues. The vulnerability was patched in Rundeck version 3.4.5, but no known workarounds exist for affected versions. There are no reports of active exploitation in the wild, but the vulnerability poses a risk in environments where multiple users have authenticated access to Rundeck and where calendar-based scheduling is integral to operations.
Potential Impact
For European organizations, the impact of CVE-2021-41112 can be significant, especially in sectors relying heavily on automation for critical infrastructure, IT operations, or business processes. Disruption or manipulation of scheduled jobs could lead to missed maintenance windows, delayed security updates, or failure to execute compliance-related tasks, potentially resulting in operational downtime, regulatory non-compliance, or security incidents. Organizations with multi-user Rundeck deployments where users have varying trust levels are particularly at risk, as lower-privileged users could escalate their influence by altering calendar configurations. This could affect industries such as finance, manufacturing, energy, and public sector entities that use Rundeck for automation. Additionally, the lack of authorization checks could undermine internal security policies and audit controls. Although no active exploits are known, the vulnerability's presence in open-source software with a web interface increases the attack surface, especially if exposed to internal or external networks without proper segmentation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Rundeck installations to version 3.4.5 or later, where the authorization checks have been properly implemented. Until upgrades can be performed, organizations should restrict authenticated access to Rundeck to trusted users only and enforce strict role-based access controls to limit who can modify calendar configurations. Network segmentation and firewall rules should be applied to limit access to Rundeck’s web console and API endpoints. Monitoring and logging of calendar modification activities should be enhanced to detect unauthorized changes promptly. Additionally, organizations should review scheduled job dependencies on calendars and implement secondary verification or alerting mechanisms for critical jobs. Regular audits of user permissions and scheduled job configurations can help identify potential misuse. Since no workarounds exist, patching remains the most effective defense. Finally, organizations should educate users about the risks of unauthorized calendar modifications and incorporate this vulnerability into their incident response planning.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2021-41112: CWE-862: Missing Authorization in rundeck rundeck
Description
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2021-41112 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting Rundeck, an open-source automation service widely used for orchestrating scheduled jobs via a web console, command line tools, and WebAPI. The vulnerability exists in Rundeck versions prior to 3.4.5 and allows any authenticated user to craft specially designed requests to modify or delete System or Project level Calendars without proper authorization checks. Calendars in Rundeck define specific days on which scheduled jobs should or should not run. By exploiting this flaw, an attacker with valid authentication can alter calendar configurations, potentially causing scheduled jobs to execute on unintended days or fail to execute on intended days. The impact of this vulnerability is context-dependent, relying heavily on the trust level of the authenticated user and the criticality of the scheduled jobs governed by these calendars. For example, if critical operational or security tasks are scheduled based on these calendars, their disruption could lead to operational outages, security lapses, or data integrity issues. The vulnerability was patched in Rundeck version 3.4.5, but no known workarounds exist for affected versions. There are no reports of active exploitation in the wild, but the vulnerability poses a risk in environments where multiple users have authenticated access to Rundeck and where calendar-based scheduling is integral to operations.
Potential Impact
For European organizations, the impact of CVE-2021-41112 can be significant, especially in sectors relying heavily on automation for critical infrastructure, IT operations, or business processes. Disruption or manipulation of scheduled jobs could lead to missed maintenance windows, delayed security updates, or failure to execute compliance-related tasks, potentially resulting in operational downtime, regulatory non-compliance, or security incidents. Organizations with multi-user Rundeck deployments where users have varying trust levels are particularly at risk, as lower-privileged users could escalate their influence by altering calendar configurations. This could affect industries such as finance, manufacturing, energy, and public sector entities that use Rundeck for automation. Additionally, the lack of authorization checks could undermine internal security policies and audit controls. Although no active exploits are known, the vulnerability's presence in open-source software with a web interface increases the attack surface, especially if exposed to internal or external networks without proper segmentation.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading Rundeck installations to version 3.4.5 or later, where the authorization checks have been properly implemented. Until upgrades can be performed, organizations should restrict authenticated access to Rundeck to trusted users only and enforce strict role-based access controls to limit who can modify calendar configurations. Network segmentation and firewall rules should be applied to limit access to Rundeck’s web console and API endpoints. Monitoring and logging of calendar modification activities should be enhanced to detect unauthorized changes promptly. Additionally, organizations should review scheduled job dependencies on calendars and implement secondary verification or alerting mechanisms for critical jobs. Regular audits of user permissions and scheduled job configurations can help identify potential misuse. Since no workarounds exist, patching remains the most effective defense. Finally, organizations should educate users about the risks of unauthorized calendar modifications and incorporate this vulnerability into their incident response planning.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-09-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf2645
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 3:33:37 PM
Last updated: 8/1/2025, 7:06:19 AM
Views: 11
Related Threats
CVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.