First published: Tue Sep 26 2023(Updated: )
JumpServer is an open source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. An attacker can exploit the directory traversal flaw using the provided URL to access and retrieve the contents of the file. `https://jumpserver-ip/api/v1/ops/playbook/e0adabef-c38f-492d-bd92-832bacc3df5f/file/?key=../../../../../../../etc/passwd` a similar method to modify the file content is also present. This issue has been addressed in version 3.6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Jumpserver | >=3.0.0<3.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42819 is a vulnerability in JumpServer, an open source bastion host, that allows logged-in users to access and modify any file on the system.
CVE-2023-42819 affects Fit2cloud Jumpserver versions 3.0.0 through 3.6.5.
CVE-2023-42819 has a severity score of 8.9, which is considered high.
An attacker can exploit CVE-2023-42819 by creating a playbook named 'test' using the 'Job-Template' menu, and then manipulating the contents of any file on the system.
Yes, a fix for CVE-2023-42819 is available. Users of Fit2cloud Jumpserver should update to a version beyond 3.6.5.