JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the ansible playbook to read arbitrary files in the celery container, leading to sensitive information disclosure. The Celery container runs as root and has database access, allowing the attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been addressed in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There is no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
Tue, 13 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-18T17:05:21.662Z
Updated: 2024-08-13T20:47:59.072Z
Reserved: 2024-07-08T16:13:15.510Z
Link: CVE-2024-40628
Vulnrichment
Updated: 2024-08-02T04:33:11.849Z
NVD
Status : Modified
Published: 2024-07-18T17:15:04.370
Modified: 2024-11-21T09:31:23.503
Link: CVE-2024-40628
Redhat
No data.