JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jumpserver/jumpserver/commit/42337f0d00b2a8d45ef063eb5b7deeef81597da5 - Patch | |
References | () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
29 Sep 2023, 15:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fit2cloud
Fit2cloud jumpserver |
|
CPE | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp - Vendor Advisory | |
References | (MISC) https://github.com/jumpserver/jumpserver/commit/42337f0d00b2a8d45ef063eb5b7deeef81597da5 - Patch |
27 Sep 2023, 15:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 15:19
Updated : 2024-11-21 08:23
NVD link : CVE-2023-42820
Mitre link : CVE-2023-42820
CVE.ORG link : CVE-2023-42820
JSON object : View
Products Affected
fit2cloud
- jumpserver
CWE