cvelist/2024/29xxx/CVE-2024-29024.json

86 lines
3.0 KiB
JSON
Raw Normal View History

2024-04-01 20:45:57 +00:00
{
2024-04-02 15:25:45 +00:00
"data_version": "4.0",
2024-04-01 20:45:57 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-29024",
2024-04-02 15:25:45 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2024-04-01 20:45:57 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-04-02 15:25:45 +00:00
"value": "JumpServer is an open source bastion host and an operation and maintenance security audit system.\nAn authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files, potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-639: Authorization Bypass Through User-Controlled Key",
"cweId": "CWE-639"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "jumpserver",
"product": {
"product_data": [
{
"product_name": "jumpserver",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": ">= 3.0.0, <= 3.10.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q",
"refsource": "MISC",
"name": "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q"
}
]
},
"source": {
"advisory": "GHSA-8wqm-rfc7-q27q",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
2024-04-01 20:45:57 +00:00
}
]
}
}