Vulnerability Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fit2Cloud | Jumpserver | >= 3.0.0, < 3.10.7 |
Related Weaknesses (CWE)
References
- https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73chExploitVendor Advisory
- https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-int
- https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73chExploitVendor Advisory
FAQ
What is CVE-2024-29202?
CVE-2024-29202 is a vulnerability with a CVSS score of 9.9 (CRITICAL). JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arb...
How severe is CVE-2024-29202?
CVE-2024-29202 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-29202?
Check the references section above for vendor advisories and patch information. Affected products include: Fit2Cloud Jumpserver.