JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
History

Mon, 23 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-09-26T20:35:22.853Z

Updated: 2024-09-23T20:26:58.683Z

Reserved: 2023-09-14T16:13:33.310Z

Link: CVE-2023-42820

cve-icon Vulnrichment

Updated: 2024-08-02T19:30:24.658Z

cve-icon NVD

Status : Modified

Published: 2023-09-27T15:19:33.227

Modified: 2024-11-21T08:23:17.097

Link: CVE-2023-42820

cve-icon Redhat

No data.