{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-29024","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-03-14T16:59:47.611Z","datePublished":"2024-03-29T14:45:56.377Z","dateUpdated":"2024-08-02T01:03:51.546Z"},"containers":{"cna":{"title":"JumpServer Direct Object Reference (IDOR) Vulnerability in File Manager Bulk Transfer Functionality","problemTypes":[{"descriptions":[{"cweId":"CWE-639","lang":"en","description":"CWE-639: Authorization Bypass Through User-Controlled Key","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q","tags":["x_refsource_CONFIRM"],"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q"}],"affected":[{"vendor":"jumpserver","product":"jumpserver","versions":[{"version":">= 3.0.0, <= 3.10.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-03-29T14:45:56.377Z"},"descriptions":[{"lang":"en","value":"JumpServer is an open source bastion host and an operation and maintenance security audit system.\nAn authenticated user can exploit the Insecure Direct Object Reference (IDOR) vulnerability in the file manager's bulk transfer by manipulating job IDs to upload malicious files,  potentially compromising the integrity and security of the system. This vulnerability is fixed in v3.10.6."}],"source":{"advisory":"GHSA-8wqm-rfc7-q27q","discovery":"UNKNOWN"}},"adp":[{"affected":[{"vendor":"fit2cloud","product":"jumpserver","cpes":["cpe:2.3:a:fit2cloud:jumpserver:3.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"3.0.0","status":"affected","lessThanOrEqual":"3.10.5","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-29T15:40:52.736769Z","id":"CVE-2024-29024","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-20T18:03:16.461Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T01:03:51.546Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q"}]}]}}