CVE-2024-29202

Scores

EPSS

0.837high83.7%
0%20%40%60%80%100%

Percentile: 83.7%

CVSS

9.9critical3.x
0246810

CVSS Score: 9.9/10

All CVSS Scores

CVSS 3.x
9.9

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Description

JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer’s Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesnvd

CWEs

CWE-94

Vulnerable Software (2)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:python:*:*",          "versionEndExcluding": "3.10.7",          "versionStartIn...

Source: anchore_overrides

Type: Configuration

Vendor: *

Product: jumpserver

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.10.7",      "versionStartIncluding": "3.0.0",      "vulnerable": true   ...

Source: nvd

End of list