5.3
CVE-2024-29020
- EPSS 0.15%
- Veröffentlicht 29.03.2024 15:15:11
- Zuletzt bearbeitet 09.01.2025 17:20:18
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
JumpServer is an open source bastion host and an operation and maintenance security audit system. An authorized attacker can obtain sensitive information contained within playbook files if they manage to learn the playbook_id of another user. This breach of confidentiality can lead to information disclosure and exposing sensitive data. This vulnerability is fixed in v3.10.6.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fit2cloud ≫ Jumpserver Version >= 3.0.0 < 3.10.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.367 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 1.6 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| security-advisories@github.com | 4.6 | 1.2 | 3.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.