Lucene search

K
cve[email protected]CVE-2024-29020
HistoryMar 29, 2024 - 3:15 p.m.

CVE-2024-29020

2024-03-2915:15:11
CWE-639
web.nvd.nist.gov
32
jumpserver
bastion host
security audit
information disclosure
playbook files
cve-2024-29020
vulnerability

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.

Affected configurations

Vulners
Node
jumpserverjumpserverRange3.0.03.10.5
VendorProductVersionCPE
jumpserverjumpserver*cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "jumpserver",
    "product": "jumpserver",
    "versions": [
      {
        "version": ">= 3.0.0, <= 3.10.5",
        "status": "affected"
      }
    ]
  }
]

4.6 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L

6.1 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for CVE-2024-29020