2019-04-09 07:27:37 +00:00
## Jumpserver
2019-04-09 04:09:11 +00:00
[![Python3 ](https://img.shields.io/badge/python-3.6-green.svg?style=plastic )](https://www.python.org/)
2021-01-18 05:46:55 +00:00
[![Django ](https://img.shields.io/badge/django-2.2-brightgreen.svg?style=plastic )](https://www.djangoproject.com/)
[![Docker Pulls ](https://img.shields.io/docker/pulls/jumpserver/jms_all.svg )](https://hub.docker.com/u/jumpserver)
2019-04-09 04:09:11 +00:00
2021-01-18 05:46:55 +00:00
----
## CRITICAL BUG WARNING
2021-01-18 10:08:38 +00:00
Recently we have found a critical bug for remote execution vulnerability which leads to pre-auth and info leak, please fix it as soon as possible.
2021-01-18 05:46:55 +00:00
2021-01-18 10:08:38 +00:00
Thanks for **reactivity from Alibaba Hackerone bug bounty program** report us this bug
2021-01-18 05:46:55 +00:00
**Vulnerable version:**
```
< v2.6.2
< v2.5.4
< v2.4.5
= v1.5.9
2021-01-18 10:08:38 +00:00
>= v1.5.3
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
**Safe and Stable version:**
2021-01-18 05:46:55 +00:00
```
>= v2.6.2
>= v2.5.4
>= v2.4.5
2021-01-18 10:08:38 +00:00
= v1.5.9 ( version tag didn't change)
< v1.5.3
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
**Bug Fix Solution:**
Upgrade to the latest version or the version mentioned above
2021-01-18 05:46:55 +00:00
2021-01-18 10:08:38 +00:00
**Temporary Solution (upgrade asap):**
2021-01-18 05:46:55 +00:00
2021-01-18 10:08:38 +00:00
Modify the Nginx config file and disable the vulnerable api listed below
2021-01-18 05:46:55 +00:00
```
/api/v1/authentication/connection-token/
/api/v1/users/connection-token/
```
2021-01-18 10:08:38 +00:00
Path to Nginx config file
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
# Previous Community version
2021-01-18 05:46:55 +00:00
/etc/nginx/conf.d/jumpserver.conf
2021-01-18 10:08:38 +00:00
# Previous Enterprise version
2021-01-18 05:46:55 +00:00
jumpserver-release/nginx/http_server.conf
2021-01-18 10:08:38 +00:00
# Latest version
2021-01-18 05:46:55 +00:00
jumpserver-release/compose/config_static/http_server.conf
```
2021-01-18 10:08:38 +00:00
Changes in Nginx config file
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
### Put the following code on top of location server, or before /api and /
2021-01-18 05:46:55 +00:00
location /api/v1/authentication/connection-token/ {
return 403;
}
location /api/v1/users/connection-token/ {
return 403;
}
2021-01-18 10:08:38 +00:00
### End right here
2021-01-18 05:46:55 +00:00
location /api/ {
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header Host $host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass http://core:8080;
}
...
```
2021-01-18 10:08:38 +00:00
Save the file and restart Nginx
2021-01-18 05:46:55 +00:00
```
docker deployment:
$ docker restart jms_nginx
rpm or other deployment:
$ systemctl restart nginx
```
2021-01-18 10:08:38 +00:00
**Bug Fix Verification**
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
# Download the following script to check if it is fixed
2021-01-18 05:46:55 +00:00
$ wget https://github.com/jumpserver/jumpserver/releases/download/v2.6.2/jms_bug_check.sh
2021-01-18 10:08:38 +00:00
# Run the code to verify it
2021-01-18 05:46:55 +00:00
$ bash jms_bug_check.sh demo.jumpserver.org
2021-01-18 10:08:38 +00:00
漏洞已修复 (It means the bug is fixed)
漏洞未修复 (It means the bug is not fixed and the system is still vulnerable)
2021-01-18 05:46:55 +00:00
```
2021-01-18 10:08:38 +00:00
**Attack Simulation**
2021-01-18 05:46:55 +00:00
2021-01-18 10:08:38 +00:00
Go to the logs directory which should contain gunicorn.log file. Then download the "attack" script and execute it
2021-01-18 05:46:55 +00:00
```
$ pwd
/opt/jumpserver/core/logs
$ ls gunicorn.log
gunicorn.log
$ wget 'https://github.com/jumpserver/jumpserver/releases/download/v2.6.2/jms_check_attack.sh'
$ bash jms_check_attack.sh
2021-01-18 10:08:38 +00:00
系统未被入侵 (It means the system is safe)
系统已被入侵 (It means the system is being attacked)
2021-01-18 05:46:55 +00:00
```
--------------------------
2019-04-09 04:09:11 +00:00
----
2021-01-18 05:46:55 +00:00
- [中文版 ](https://github.com/jumpserver/jumpserver/blob/master/README.md )
2019-04-09 07:27:37 +00:00
2021-01-18 10:08:38 +00:00
Jumpserver is the world's first open-source PAM (Privileged Access Management System) and is licensed under the GNU GPL v2.0. It is a 4A-compliant professional operation and maintenance security audit system.
2019-04-09 04:09:11 +00:00
2021-01-18 10:08:38 +00:00
Jumpserver uses Python / Django for development, follows Web 2.0 specifications, and is equipped with an industry-leading Web Terminal solution that provides a beautiful user interface and great user experience
2019-04-09 04:09:11 +00:00
2021-01-18 10:08:38 +00:00
Jumpserver adopts a distributed architecture to support multi-branch deployment across multiple cross-regional areas. The central node provides APIs, and login nodes are deployed in each branch. It can be scaled horizontally without concurrency restrictions.
2019-04-09 04:09:11 +00:00
Change the world, starting from little things.
----
### Features
![Jumpserver 功能 ](https://jumpserver-release.oss-cn-hangzhou.aliyuncs.com/Jumpserver148.jpeg "Jumpserver 功能" )
### Start
Quick start [Docker Install ](http://docs.jumpserver.org/zh/docs/dockerinstall.html )
Step by Step deployment. [Docs ](http://docs.jumpserver.org/zh/docs/step_by_step.html )
Full documentation [Docs ](http://docs.jumpserver.org )
### Demo、Video 和 Snapshot
We provide online demo, demo video and screenshots to get you started quickly.
[Demo ](https://demo.jumpserver.org/auth/login/?next=/ )
[Video ](https://fit2cloud2-offline-installer.oss-cn-beijing.aliyuncs.com/tools/Jumpserver%20%E4%BB%8B%E7%BB%8Dv1.4.mp4 )
[Snapshot ](http://docs.jumpserver.org/zh/docs/snapshot.html )
### SDK
We provide the SDK for your other systems to quickly interact with the Jumpserver API.
- [Python ](https://github.com/jumpserver/jumpserver-python-sdk ) Jumpserver other components use this SDK to complete the interaction.
2021-01-18 10:08:38 +00:00
- [Java ](https://github.com/KaiJunYan/jumpserver-java-sdk.git ) Thanks to 恺珺 for providing his Java SDK vesrion.
2019-04-09 04:09:11 +00:00
### License & Copyright
Copyright (c) 2014-2019 Beijing Duizhan Tech, Inc., All rights reserved.
Licensed under The GNU General Public License version 2 (GPLv2) (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
https://www.gnu.org/licenses/gpl-2.0.html
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.