Description
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 17 Dec 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fit2cloud
Fit2cloud jumpserver |
|
| CPEs | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fit2cloud
Fit2cloud jumpserver |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-01T23:28:11.975Z
Reserved: 2024-01-29T20:51:26.011Z
Link: CVE-2024-24763
Updated: 2024-08-01T23:28:11.975Z
Status : Analyzed
Published: 2024-02-20T18:15:52.520
Modified: 2024-12-17T20:03:30.613
Link: CVE-2024-24763
No data.
OpenCVE Enrichment
No data.
Weaknesses