JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-26080 | JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 09 Jan 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
| CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:03:51.654Z
Reserved: 2024-03-14T16:59:47.610Z
Link: CVE-2024-29020
Updated: 2024-08-02T01:03:51.654Z
Status : Analyzed
Published: 2024-03-29T15:15:11.437
Modified: 2025-01-09T17:20:18.197
Link: CVE-2024-29020
No data.
OpenCVE Enrichment
No data.
EUVD