JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the Ansible playbook to write arbitrary files, leading to remote code execution (RCE) in the Celery container. The Celery container runs as root and has database access, allowing an attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been patched in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 10 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-18T17:04:10.251Z
Updated: 2024-08-02T04:33:11.826Z
Reserved: 2024-07-08T16:13:15.510Z
Link: CVE-2024-40629
Vulnrichment
Updated: 2024-07-18T18:39:01.312Z
NVD
Status : Modified
Published: 2024-07-18T17:15:04.613
Modified: 2024-11-21T09:31:23.640
Link: CVE-2024-40629
Redhat
No data.