First published: Tue Nov 28 2023(Updated: )
Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can be run by authorized users who are allowed to execute files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fit2cloud Jumpserver | =3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48193 is critical with a severity value of 9.8.
CVE-2023-48193 is an Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 that allows a remote attacker to execute arbitrary code via bypassing the command filtering function.
JumpServer GPLv3 v.3.8.0 is affected by CVE-2023-48193.
A remote attacker can exploit CVE-2023-48193 by bypassing the command filtering function and executing arbitrary code.
You can find more information about CVE-2023-48193 at the following references: [GitHub](https://github.com/jumpserver/jumpserver), [JumpServer](http://jumpserver.com), [GitHub](https://github.com/296430468/lcc_test/blob/main/jumpserver_BUG.md).