JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Oct 2023, 19:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fit2cloud
Fit2cloud jumpserver |
|
CWE | CWE-307 | |
References | (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* |
27 Sep 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 21:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-42818
Mitre link : CVE-2023-42818
CVE.ORG link : CVE-2023-42818
JSON object : View
Products Affected
fit2cloud
- jumpserver