CVE-2021-32016
📋 TL;DR
This vulnerability in JUMP AMS allows attackers to write arbitrary files to any location on the filesystem via directory traversal in a SOAP endpoint. This can lead to remote code execution, affecting all systems running vulnerable versions of JUMP AMS.
💻 Affected Systems
- JUMP AMS
📦 What is this software?
Asset Management by Jump Technology
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through remote code execution, allowing attackers to execute arbitrary commands, steal data, or deploy ransomware.
Likely Case
Remote code execution leading to unauthorized access, data exfiltration, or lateral movement within the network.
If Mitigated
File writes limited to non-critical locations with minimal impact if proper file permissions and network segmentation are in place.
🎯 Exploit Status
Directory traversal vulnerabilities are typically easy to exploit once discovered.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version 3.6.0.04.009-2488 or later
Vendor Advisory: https://cds.thalesgroup.com/en/tcs-cert/CVE-2021-32016
Restart Required: Yes
Instructions:
1. Download the latest patch from Thales support portal. 2. Backup current installation. 3. Apply the patch following vendor instructions. 4. Restart the JUMP AMS service.
🔧 Temporary Workarounds
Restrict SOAP endpoint access
linuxBlock external access to the vulnerable SOAP endpoint using network controls
iptables -A INPUT -p tcp --dport [SOAP_PORT] -j DROP
Implement WAF rules
allAdd rules to detect and block directory traversal patterns in SOAP requests
🧯 If You Can't Patch
- Isolate JUMP AMS systems in a restricted network segment with no internet access
- Implement strict file system permissions to limit write access for the JUMP AMS service account
🔍 How to Verify
Check if Vulnerable:
Check JUMP AMS version in administration console or configuration files
Check Version:
Check JUMP AMS web interface or consult system documentation for version command
Verify Fix Applied:
Verify version is 3.6.0.04.009-2488 or later and test SOAP endpoint for directory traversal
📡 Detection & Monitoring
Log Indicators:
- Unusual file write operations in system logs
- SOAP requests containing '../' patterns
- Failed authentication attempts on SOAP endpoints
Network Indicators:
- Unusual traffic to SOAP endpoints from unexpected sources
- POST requests with file path traversal patterns
SIEM Query:
source="JUMP_AMS" AND (uri="*../*" OR method="POST" AND uri="*/soap/*")