CVE-2024-29202: JumpServer vulnerable to Jinja2 template injection in Ansible leads to RCE in Celery

10.0 CVSS

Description

JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.

Classification

CVE ID: CVE-2024-29202

CVSS Base Severity: CRITICAL

CVSS Base Score: 10.0

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Affected Products

Vendor: jumpserver

Product: jumpserver

Exploit Prediction Scoring System (EPSS)

EPSS Score: 78.21% (probability of being exploited)

EPSS Percentile: 98.97% (scored less or equal to compared to others)

EPSS Date: 2025-04-08 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: poc

SSVC Technical Impact: total

SSVC Automatable: false

Timeline