Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/jumpserver/jumpserver: CVE-2024-29201 #3574

Open
GoVulnBot opened this issue Mar 25, 2025 · 0 comments

Comments

@GoVulnBot
Copy link

Advisory CVE-2024-29201 references a vulnerability in the following Go modules:

Module
github.com/jumpserver/jumpserver

Description:
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.

References:

No existing reports found with this module or alias.
See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/jumpserver/jumpserver
      vulnerable_at: 4.8.0+incompatible
summary: CVE-2024-29201 in github.com/jumpserver/jumpserver
cves:
    - CVE-2024-29201
references:
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-29201
    - web: https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj
    - web: https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-2-2
source:
    id: CVE-2024-29201
    created: 2025-03-25T21:01:33.796655634Z
review_status: UNREVIEWED

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

2 participants