First published: Fri Jul 23 2021(Updated: )
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jumpserver | >=2.4.0<2.4.5 | |
Jumpserver | >=2.5.0<2.5.4 | |
Jumpserver | >=2.6.0<2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3169 is classified as a high-severity vulnerability due to the potential for unauthorized access to sensitive assets.
To fix CVE-2021-3169, update Jumpserver to a version later than 2.6.2.
The impact of CVE-2021-3169 includes the ability for attackers to create unauthorized connection tokens and access sensitive information.
Jumpserver versions 2.6.2 and below are affected by CVE-2021-3169.
The exploit vector for CVE-2021-3169 involves making API calls that lack proper access control.