JumpServer is an open-source Privileged Access Management (PAM) tool that provides DevOps and IT teams with on-demand and secure access to SSH, RDP, Kubernetes, Database and RemoteApp endpoints through a web browser. An attacker can exploit the Ansible playbook to write arbitrary files, leading to remote code execution (RCE) in the Celery container. The Celery container runs as root and has database access, allowing an attacker to steal all secrets for hosts, create a new JumpServer account with admin privileges, or manipulate the database in other ways. This issue has been patched in release versions 3.10.12 and 4.0.0. It is recommended to upgrade the safe versions. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 25 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 10 Sep 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-25T19:59:14.014Z
Reserved: 2024-07-08T16:13:15.510Z
Link: CVE-2024-40629

Updated: 2024-08-02T04:33:11.826Z

Status : Modified
Published: 2024-07-18T17:15:04.613
Modified: 2025-03-25T20:15:22.197
Link: CVE-2024-40629

No data.