CERT-In Vulnerability Note
CIVN-2024-0227
JumpServer File Read and Upload Vulnerability
Original Issue Date:July 30, 2024
Severity Rating: CRITICAL
Software Affected
- JumpServer v3.0.0-v3.10.11
Overview
Multiple vulnerabilities have been reported in JumpServer which could allow a remote authenticated attacker to gain access to sensitive information and execute arbitrary code on the target system.
Description
These vulnerabilities exist in JumpServer due to improper permission configuration of the Ansible playbook module. An attacker with a low-privilege account can use the ansible playbook to read arbitrary files in the celery container or can write arbitrary files using Ansible scripts.
Successful exploitation of these vulnerabilities could allow an attacker to gain access to sensitive information and execute arbitrary code on the target system.
Solution
Apply appropriate updates as mentioned:
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-rpf7-g4xh-84v9
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-3wgp-q8m7-v33v
Vendor Information
JumpServer
https://github.com/jumpserver/jumpserver/releases
References
NSFOCUS
https://nsfocusglobal.com/jumpserver-file-read-and-upload-vulnerability-cve-2024-40628-cve-2024-40629-notification/
CVE Name
CVE-2024-40628
CVE-2024-40629
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-22902657
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|