Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-41112: CWE-862: Missing Authorization in rundeck rundeck

0
Medium
Published: Mon Feb 28 2022 (02/28/2022, 19:15:17 UTC)
Source: CVE
Vendor/Project: rundeck
Product: rundeck

Description

Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorization. Modifying or removing calendars could cause Scheduled Jobs to execute, or not execute on desired calendar days. Severity depends on trust level of authenticated users and impact of running or not running scheduled jobs on days governed by calendar definitions. Version 3.4.5 contains a patch for this issue. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/23/2025, 15:33:37 UTC

Technical Analysis

CVE-2021-41112 is a security vulnerability classified under CWE-862 (Missing Authorization) affecting Rundeck, an open-source automation service widely used for orchestrating scheduled jobs via a web console, command line tools, and WebAPI. The vulnerability exists in Rundeck versions prior to 3.4.5 and allows any authenticated user to craft specially designed requests to modify or delete System or Project level Calendars without proper authorization checks. Calendars in Rundeck define specific days on which scheduled jobs should or should not run. By exploiting this flaw, an attacker with valid authentication can alter calendar configurations, potentially causing scheduled jobs to execute on unintended days or fail to execute on intended days. The impact of this vulnerability is context-dependent, relying heavily on the trust level of the authenticated user and the criticality of the scheduled jobs governed by these calendars. For example, if critical operational or security tasks are scheduled based on these calendars, their disruption could lead to operational outages, security lapses, or data integrity issues. The vulnerability was patched in Rundeck version 3.4.5, but no known workarounds exist for affected versions. There are no reports of active exploitation in the wild, but the vulnerability poses a risk in environments where multiple users have authenticated access to Rundeck and where calendar-based scheduling is integral to operations.

Potential Impact

For European organizations, the impact of CVE-2021-41112 can be significant, especially in sectors relying heavily on automation for critical infrastructure, IT operations, or business processes. Disruption or manipulation of scheduled jobs could lead to missed maintenance windows, delayed security updates, or failure to execute compliance-related tasks, potentially resulting in operational downtime, regulatory non-compliance, or security incidents. Organizations with multi-user Rundeck deployments where users have varying trust levels are particularly at risk, as lower-privileged users could escalate their influence by altering calendar configurations. This could affect industries such as finance, manufacturing, energy, and public sector entities that use Rundeck for automation. Additionally, the lack of authorization checks could undermine internal security policies and audit controls. Although no active exploits are known, the vulnerability's presence in open-source software with a web interface increases the attack surface, especially if exposed to internal or external networks without proper segmentation.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading Rundeck installations to version 3.4.5 or later, where the authorization checks have been properly implemented. Until upgrades can be performed, organizations should restrict authenticated access to Rundeck to trusted users only and enforce strict role-based access controls to limit who can modify calendar configurations. Network segmentation and firewall rules should be applied to limit access to Rundeck’s web console and API endpoints. Monitoring and logging of calendar modification activities should be enhanced to detect unauthorized changes promptly. Additionally, organizations should review scheduled job dependencies on calendars and implement secondary verification or alerting mechanisms for critical jobs. Regular audits of user permissions and scheduled job configurations can help identify potential misuse. Since no workarounds exist, patching remains the most effective defense. Finally, organizations should educate users about the risks of unauthorized calendar modifications and incorporate this vulnerability into their incident response planning.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2021-09-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2645

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 3:33:37 PM

Last updated: 2/7/2026, 11:36:53 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats