Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-38548 | JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the ansible playbook to read arbitrary files in the celery container, leading to sensitive information disclosure. The Celery container runs as root and has database access, allowing the attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been addressed in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There is no known workarounds for this vulnerability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 25 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
| CPEs | cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jumpserver
Jumpserver jumpserver |
|
| References |
| |
| Metrics |
ssvc
|
Tue, 10 Sep 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
| CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
Tue, 13 Aug 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | ||
| Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-25T19:58:34.928Z
Reserved: 2024-07-08T16:13:15.510Z
Link: CVE-2024-40628
Updated: 2024-08-02T04:33:11.849Z
Status : Modified
Published: 2024-07-18T17:15:04.370
Modified: 2025-03-25T20:15:22.063
Link: CVE-2024-40628
No data.
OpenCVE Enrichment
No data.
EUVD