jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-50378 | jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 25 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jumpserver
Jumpserver jumpserver |
|
| CPEs | cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jumpserver
Jumpserver jumpserver |
|
| Metrics |
ssvc
|
Tue, 25 Mar 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0. | jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0. |
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-25T19:30:48.886Z
Reserved: 2023-10-16T17:51:35.571Z
Link: CVE-2023-46123
Updated: 2024-08-02T20:37:39.404Z
Status : Modified
Published: 2023-10-25T18:17:36.330
Modified: 2025-03-25T20:15:20.513
Link: CVE-2023-46123
No data.
OpenCVE Enrichment
No data.
EUVD