First published: Wed Oct 25 2023(Updated: )
jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
<3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46123 is a vulnerability in the Core API of jumpserver that allows attackers to bypass password brute-force protections.
Jumpserver is an open source bastion machine professional operation and maintenance security audit system that complies with 4A specifications.
The CVE-2023-46123 vulnerability can be exploited by spoofing arbitrary IP addresses to bypass password brute-force protections in jumpserver.
The affected software version is Fit2cloud Jumpserver up to and excluding version 3.8.0.
The CVE-2023-46123 vulnerability has a severity rating of 5.3 (medium).