CVE-2024-29201
- EPSS 68.52%
- Veröffentlicht 29.03.2024 15:15:11
- Zuletzt bearbeitet 25.03.2025 20:15:21
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery cont...
CVE-2024-29024
- EPSS 0.09%
- Veröffentlicht 29.03.2024 15:15:11
- Zuletzt bearbeitet 09.01.2025 17:32:54
JumpServer is an open source bastion host and an operation and maintenance security audit system. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs ...
CVE-2024-24763
- EPSS 30.68%
- Veröffentlicht 20.02.2024 18:15:52
- Zuletzt bearbeitet 17.12.2024 20:03:30
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phi...
CVE-2023-48193
- EPSS 3.85%
- Veröffentlicht 28.11.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:31:11
Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can...
CVE-2023-46138
- EPSS 0.04%
- Veröffentlicht 31.10.2023 00:15:10
- Zuletzt bearbeitet 21.11.2024 08:27:57
JumpServer is an open source bastion host and maintenance security audit system that complies with 4A specifications. Prior to version 3.8.0, the default email for initial user admin is `admin[@]mycompany[.]com`, and users reset their passwords by se...
CVE-2023-46123
- EPSS 0.44%
- Veröffentlicht 25.10.2023 18:17:36
- Zuletzt bearbeitet 25.03.2025 20:15:20
jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary ...
CVE-2023-43651
- EPSS 13.92%
- Veröffentlicht 27.09.2023 21:15:10
- Zuletzt bearbeitet 25.03.2025 20:15:19
JumpServer is an open source bastion host. An authenticated user can exploit a vulnerability in MongoDB sessions to execute arbitrary commands, leading to remote code execution. This vulnerability may further be leveraged to gain root privileges on t...
CVE-2023-42818
- EPSS 0.16%
- Veröffentlicht 27.09.2023 21:15:10
- Zuletzt bearbeitet 25.03.2025 20:15:19
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public...
CVE-2023-43652
- EPSS 0.63%
- Veröffentlicht 27.09.2023 19:15:12
- Zuletzt bearbeitet 27.05.2025 21:24:18
JumpServer is an open source bastion host. As an unauthenticated user, it is possible to authenticate to the core API with a username and an SSH public key without needing a password or the corresponding SSH private key. An SSH public key should be c...
CVE-2023-43650
- EPSS 0.39%
- Veröffentlicht 27.09.2023 19:15:11
- Zuletzt bearbeitet 21.04.2025 14:32:27
JumpServer is an open source bastion host. The verification code for resetting user's password is vulnerable to brute-force attacks due to the absence of rate limiting. JumpServer provides a feature allowing users to reset forgotten passwords. Affect...