Page 2 of 8 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

JumpServer is an open source bastion host and an operation and maintenance security audit system. An authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files, potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6. JumpServer es un host bastión de código abierto y un sistema de auditoría de seguridad de operación y mantenimiento. Un usuario autenticado puede aprovechar la vulnerabilidad de referencia directa de objetos inseguros (IDOR) en la transferencia masiva del administrador de archivos manipulando los ID de los trabajos para cargar archivos maliciosos, comprometiendo potencialmente la integridad y seguridad del sistema. Esta vulnerabilidad se solucionó en v3.10.6. • https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available. JumpServer es un host bastión de código abierto y un sistema de auditoría de seguridad de operación y mantenimiento. • https://github.com/jumpserver/jumpserver/releases/tag/v3.10.0 https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

An issue in Jumpserver before 2.6.2, before 2.5.4, before 2.4.5 allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets. Un problema en Jumpserver versiones 2.6.2 e inferiores, permite a atacantes crear un token de conexión mediante una API que no presenta control de acceso y usarlo para acceder a activos confidenciales • https://blog.fit2cloud.com/?p=1764 https://mp.weixin.qq.com/s/5tgcaIrnDnGP-LvWPw9YCg https://s.tencent.com/research/bsafe/1228.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •