jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
References
Link | Resource |
---|---|
https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 | Release Notes |
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2023-10-25T00:13:00.565Z
Updated: 2023-10-25T00:13:00.565Z
Reserved: 2023-10-16T17:51:35.571Z
Link: CVE-2023-46123
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-25T18:17:36.330
Modified: 2023-11-01T16:40:03.197
Link: CVE-2023-46123
JSON object: View
Redhat Information
No data.
CWE