Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-29201 PoC — JumpServer's insecure Ansible playbook validation leads to RCE in Celery

Source
Associated Vulnerability
Title:JumpServer's insecure Ansible playbook validation leads to RCE in Celery (CVE-2024-29201)
Description:JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can bypass the input validation mechanism in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and has database access, attackers could steal sensitive information from all hosts or manipulate the database. This vulnerability is fixed in v3.10.7.
File Snapshot

# JumpServer 远程代码执行漏洞 CVE-2024-29201&CVE-2024-29202 ## 漏洞描述 JumpServer 是使用广泛的开源堡垒机,使用 GNU GPL v2.0 ...
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →