JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the ansible playbook to read arbitrary files in the celery container, leading to sensitive information disclosure. The Celery container runs as root and has database access, allowing the attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been addressed in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There is no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
CPEs | cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jumpserver
Jumpserver jumpserver |
|
References |
| |
Metrics |
ssvc
|
Tue, 10 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
Tue, 13 Aug 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-25T19:58:34.928Z
Reserved: 2024-07-08T16:13:15.510Z
Link: CVE-2024-40628

Updated: 2024-08-02T04:33:11.849Z

Status : Modified
Published: 2024-07-18T17:15:04.370
Modified: 2025-03-25T20:15:22.063
Link: CVE-2024-40628

No data.