First published: Thu Mar 16 2023(Updated: )
Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes cluster through Koko can result in the execution of dangerous commands that may disrupt the Koko container environment and affect normal usage. The vulnerability has been fixed in v2.28.8.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Jumpserver | <2.28.8 | |
Fit2cloud Koko |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28110 is a vulnerability in Jumpserver and Koko that allows unauthorized access to a Kubernetes cluster.
CVE-2023-28110 has a severity rating of critical with a score of 9.9 out of 10.
Jumpserver versions up to 2.28.8 and Koko versions prior to the Go version are affected by CVE-2023-28110.
To fix CVE-2023-28110, update Jumpserver to version 2.28.8 or later, and Koko to the latest Go version.
You can find more information about CVE-2023-28110 on the GitHub release page for Jumpserver version 2.28.8 and the GitHub security advisories page for Jumpserver.