Skip to content

Commit a7e963f

Browse files
authored
Merge pull request #1607 from rundeck/cves
RUN-2936: CVE False Positives
2 parents 2ebec72 + c657d79 commit a7e963f

File tree

8 files changed

+52
-6
lines changed

8 files changed

+52
-6
lines changed

docs/.vuepress/config.ts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,6 @@ export default defineUserConfig({
130130
'/manual/command-line-tools/index.html' : '/rd-cli/index.html',
131131
'/manual/command-line-tools/rd.html' : '/rd-cli/index.html',
132132
'/manual/command-line-tools/rd-acl.html' : '/rd-cli/rd-ext-acl.html',
133-
'/history/cves/' : '/history/CVEs/',
134133
'/introduction/introduction.html' : '/about/introduction.html',
135134
'/administration/architecture-and-deployment/system-architecture.html' : '/about/enterprise/index.html',
136135
'/administration/architecture-and-deployment/aws.html' : '/administration/install/aws.html',

docs/history/cves/cve-2016-1000027.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
order: 800
2+
order: 1800
33
---
44

55
# CVE-2016-1000027

docs/history/cves/cve-2020-0187.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
order: 1300
3+
---
4+
5+
6+
# CVE-2020-0187
7+
8+
::: danger FALSE POSITIVE
9+
Rundeck and Runbook Automation are not vulnerable to this CVE.
10+
:::
11+
12+
This finding is only vulnerable on Android 10. It does not apply to Rundeck or Runbook Automation products.

docs/history/CVEs/cve-2023-39017.md renamed to docs/history/cves/cve-2023-39017.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
order: 1300
2+
order: 350
33
---
44

55
# CVE-2023-39017

docs/history/cves/cve-2024-24786.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
order: 90
3+
---
4+
5+
# CVE-2024-24786
6+
7+
## Remco / Google Protobuf vulnerability
8+
9+
::: danger FALSE POSITIVE
10+
Rundeck and Runbook Automation are not vulnerable to this CVE.
11+
:::
12+
13+
The vulnerability exists in all versions of google.golang.org/protobuf before 1.33.0 and it is used by Remco (not used directly by Rundeck). Currently, the Rundeck and Runbook Automation Dockerfile that builds Remco uses a specific commit uses the protobuf version 1.32.0. At the time of this writing there is no update to the Remco build to use the latest the protobuf library.
14+
15+
Protobuf is used by Remco when configured to receive config values from other backends like redis, or secrets from vault. Rundeck and Runbook Automation products do not use those modes as part of Remco, and therefore would not be vulnerable to this finding.

docs/history/cves/cve-2024-38807.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
order: 80
3+
---
4+
5+
# CVE-2024-33807
6+
7+
## Spring Boot Loader Vulnerability
8+
9+
::: danger FALSE POSITIVE
10+
Rundeck and Runbook Automation are not vulnerable to this CVE.
11+
:::
12+
13+
The vulnerability exists in Spring Boot Loader 2.7.0 to 2.7.21 and it was fixed on 2.7.22.
14+
15+
Rundeck uses Spring Boot 2.7.18 that is part of the Grails 6.1 version and it would require an update on Grails Framework. This update is currently not scheduled until 2025 sometime.
16+
17+
The vulnerability exists when `custom code that performs signature verification of nested jar files may be vulnerable to signature forgery where content that appears to have been signed by one signer has, in fact, been signed by another.` This is not used in Rundeck or Runbook Automation products and they are not vulnerable to this finding.

docs/history/cves/index.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
order: 100
2+
order: 10
33
---
44

55
# Security Notices
@@ -34,8 +34,11 @@ These are the Security Advisories Rundeck has issued in the past. It is always
3434
## Additional CVE Notes
3535

3636
* Log4j / Log4Shell will flag a false positive vulnerability related to our JIRA plugins. [More Details on this page](log4j.md)
37+
* [CVE-2016-1000027 Spring Unsafe Java deserialization](cve-2016-1000027.md).
38+
* [CVE-2020-0187 Android 10 Finding](cve-2020-0187.md).
3739
* [CVE-2022-45868 H2 DB false positive](cve-2022-45868.md).
3840
* [CVE-2022-1471 SnakeYAML false positive](cve-2022-1471.md).
3941
* [CVE-2024-1597 Postgres JDBC Driver Vulnerability](cve-2024-1597.md).
40-
* [CVE-2016-1000027 Spring Unsafe Java deserialization](cve-2016-1000027.md).
4142
* [CVE-2023-39017 Quartz Scheduler false positive](cve-2023-39017.md).
43+
* [CVE-2024-24786 Protobuf finding in Remco](cve-2024-38807.md).
44+
* [CVE-2024-38807 Spring Boot false positive](cve-2024-38807.md).

docs/history/CVEs/log4j.md renamed to docs/history/cves/log4j.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
order: 1500
2+
order: 2000
33
---
44

55
# Log4Shell / Log4j Security

0 commit comments

Comments
 (0)