First published: Fri Mar 29 2024(Updated: )
JumpServer is an open source bastion host and an operation and maintenance security audit system. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files, potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jumpserver | >=3.0.0<3.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29024 has a medium severity rating due to the potential for authenticated users to upload malicious files.
To fix CVE-2024-29024, update JumpServer to version 3.10.6 or higher.
CVE-2024-29024 affects authenticated users of JumpServer versions between 3.0.0 and 3.10.6.
CVE-2024-29024 is classified as an Insecure Direct Object Reference (IDOR) vulnerability.
An attacker can upload malicious files to the system by exploiting the CVE-2024-29024 vulnerability.