CVE-2023-42818

JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*

History

02 Oct 2023, 19:59

Type Values Removed Values Added
CWE CWE-287 CWE-307
CPE cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
References (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv - (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv - Exploit, Vendor Advisory
First Time Fit2cloud jumpserver
Fit2cloud
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

27 Sep 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-27 21:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-42818

Mitre link : CVE-2023-42818

CVE.ORG link : CVE-2023-42818


JSON object : View

Products Affected

fit2cloud

  • jumpserver
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts

CWE-287

Improper Authentication