Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2023-46123
HistoryOct 25, 2023 - 12:13 a.m.

CVE-2023-46123 jumpserver is vulnerable to password brute-force protection bypass via arbitrary IP values

2023-10-2500:13:00
CWE-307
GitHub_M
github.com
1
cve-2023-46123
jumpserver
brute-force protection
ip addresses
core api
patch

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

21.7%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*"
    ],
    "vendor": "jumpserver",
    "product": "jumpserver",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "3.8.0",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

7.4

Confidence

Low

EPSS

0.001

Percentile

21.7%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-46123