First published: Tue Sep 26 2023(Updated: )
JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Jumpserver | >=2.24.0<2.28.19 | |
Fit2cloud Jumpserver | >=3.0.0<3.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42820 is a vulnerability in JumpServer, an open-source bastion host, that exposes the random number seed to the API, potentially allowing replay attacks on verification codes and password resets.
CVE-2023-42820 affects JumpServer versions 2.24.0 to 2.28.19 and versions 3.0.0 to 3.6.5.
CVE-2023-42820 has a severity rating of 8.2, which is considered high.
No, if MFA is enabled, users are not affected by CVE-2023-42820.
To fix CVE-2023-42820, users should update their JumpServer installation to a version higher than 2.28.19 or 3.6.5, depending on the affected version.