CVE-2025-58044

6.1 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in JumpServer's internationalization endpoint. Attackers can craft malicious URLs that redirect users to arbitrary external sites by exploiting improper validation of the Referer header. All JumpServer instances running versions before v3.10.19 or v4.10.5 are affected.

💻 Affected Systems

Products:
  • JumpServer
Versions: All versions prior to v3.10.19 and v4.10.5
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of affected versions. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect authenticated users to phishing sites that steal credentials or deliver malware, potentially leading to full system compromise if users are tricked into entering sensitive information.

🟠

Likely Case

Attackers use the open redirect in phishing campaigns to make malicious links appear legitimate, increasing the success rate of credential harvesting attacks against JumpServer users.

🟢

If Mitigated

With proper user awareness training and web filtering, the impact is limited to potential user confusion from unexpected redirects, but no direct system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and exploitation is straightforward by crafting a malicious URL with a manipulated Referer header.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.10.19 or v4.10.5

Vendor Advisory: https://github.com/jumpserver/jumpserver/security/advisories/GHSA-h762-mj7p-jwjq

Restart Required: Yes

Instructions:

1. Backup your JumpServer configuration and data. 2. Update to v3.10.19 (for v3.x branch) or v4.10.5 (for v4.x branch). 3. Restart all JumpServer services. 4. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rule

all

Block requests to the vulnerable endpoint or filter Referer headers containing external domains

Reverse Proxy Filtering

linux

Configure reverse proxy (nginx, Apache) to block or sanitize Referer headers for /core/i18n// endpoint

🧯 If You Can't Patch

  • Implement strict web filtering to block redirects to external domains
  • Deploy user awareness training about phishing risks and URL verification

🔍 How to Verify

Check if Vulnerable:

Test by accessing /core/i18n// endpoint with a manipulated Referer header pointing to an external domain and check if redirect occurs

Check Version:

Check JumpServer web interface admin panel or run: docker exec jumpserver_core python -c "import jumpserver; print(jumpserver.__version__)"

Verify Fix Applied:

After patching, repeat the vulnerability test - the system should no longer redirect based on Referer header

📡 Detection & Monitoring

Log Indicators:

  • Multiple 302 redirect responses from /core/i18n// endpoint
  • Referer headers containing external domains in access logs

Network Indicators:

  • HTTP traffic to /core/i18n// with Referer headers
  • Unexpected redirects from JumpServer to external domains

SIEM Query:

source="jumpserver" AND (url_path="/core/i18n//" AND http_status=302) | stats count by src_ip, referer

🔗 References

📤 Share & Export