CVE-2024-24763

JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*

History

17 Dec 2024, 20:03

Type Values Removed Values Added
CPE cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
First Time Fit2cloud
Fit2cloud jumpserver
References () https://github.com/jumpserver/jumpserver/releases/tag/v3.10.0 - () https://github.com/jumpserver/jumpserver/releases/tag/v3.10.0 - Release Notes
References () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5 - () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5 - Vendor Advisory

Information

Published : 2024-02-20 18:15

Updated : 2024-12-17 20:03


NVD link : CVE-2024-24763

Mitre link : CVE-2024-24763

CVE.ORG link : CVE-2024-24763


JSON object : View

Products Affected

fit2cloud

  • jumpserver
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')