SB2024032958 - Multiple vulnerabilities in JumpServer



SB2024032958 - Multiple vulnerabilities in JumpServer

Published: March 29, 2024 Updated: April 27, 2026

Security Bulletin ID SB2024032958
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Exposed dangerous method or function (CVE-ID: CVE-2024-29201)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to exposed dangerous functionality in the Ansible module when validating and executing user-supplied playbook templates. A remote user can create a specially crafted playbook template and run a job to execute arbitrary code.

Successful exploitation occurs within the Celery container, which runs with root privileges and has database access.


2) Improper Neutralization of Special Elements Used in a Template Engine (CVE-ID: CVE-2024-29202)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to improper neutralization of special elements used in a template engine in JumpServer Ansible job templates when processing user-supplied playbook templates. A remote user can create a specially crafted playbook template and run a job to execute arbitrary code.

Code execution occurs within the Celery container, which runs with root privileges and has database access.


Remediation

Install update from vendor's website.