Unrated severityNVD Advisory· Published Mar 29, 2024· Updated Mar 25, 2025
JumpServer's insecure Ansible playbook validation leads to RCE in Celery
CVE-2024-29201
Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
Affected products
1- Range: >= 3.0.0, <= 3.10.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwjmitrex_refsource_CONFIRM
- www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-2-2mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.