JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T01:03:51.654Z
Reserved: 2024-03-14T16:59:47.610Z
Link: CVE-2024-29020

Updated: 2024-08-02T01:03:51.654Z

Status : Analyzed
Published: 2024-03-29T15:15:11.437
Modified: 2025-01-09T17:20:18.197
Link: CVE-2024-29020

No data.