First published: Fri Mar 29 2024(Updated: )
JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jumpserver | >=3.0.0<3.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29020 has been classified with a severity level that indicates a critical risk to sensitive information.
To fix CVE-2024-29020, ensure that you update JumpServer to a version greater than 3.10.6.
CVE-2024-29020 exposes sensitive information contained within playbook files to unauthorized attackers.
CVE-2024-29020 affects users of JumpServer versions between 3.0.0 and 3.10.6.
Yes, an authorized attacker can exploit CVE-2024-29020 if they acquire the playbook_id of another user.