# ExploitTitle:RundeckCommunityEdition before 3.0.13MultipleStoredXSS
# VendorHomepage: https://www.rundeck.com/open-source
# SoftwareLink: https://docs.rundeck.com/downloads.html
# ExploitAuthor:IshaqMohammed
# Contact: https://twitter.com/security_prince
# Website: https://about.me/security-prince
# Category: webapps
# Platform:Java
# CVE:CVE-2019-68041.Description:Cross-SiteScripting issues affecting multiple fields in the workflow
moduleunder job edit form by injecting javascript code in the Arguments,InvocationString, and FileExtension field, the input from these fields
are rendered in the ExecutionPreview which is the sink of this
vulnerability.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-68042.Proof of Concept:VulnerableEndpoints/Systems
http://{Rundeck_hostname}/project/{Jobname}/job/edit/{Job_ID}StepstoReproduce:LogintoRundeckServerwithvalid credentials.1.Navigatetoany project in the instance.2.Navigatetothe jobs module3.Select a job
4.From the right hand side drop down menu, select edit this job
5.NavigatetoWorkflowmodule6.Scroll down toarguments field
7.Enter the following payload:<img/src="https://www.exploit-db.com/exploits/46251/x"onerror=alert(19)8.The same payload can be entered in the Advanced mode in the same modulein two other fields "Invokation String" and "File Extension"9.Observe the payload getting executed in the "Execution Preview"3.Solution:The issue is now patched by the vendor in version 3.0.13
https://docs.rundeck.com/docs/history/version-3.0.13.html
https://github.com/rundeck/rundeck/issues/4406--BestRegards,IshaqMohammed
https://about.me/security-prince