JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-09-26T20:35:22.853Z

Updated: 2024-08-02T19:30:24.658Z

Reserved: 2023-09-14T16:13:33.310Z

Link: CVE-2023-42820

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-09-27T15:19:33.227

Modified: 2023-09-29T15:04:32.443

Link: CVE-2023-42820

cve-icon Redhat

No data.