CVE-2023-46123
CVSS V2 None
CVSS V3 None
Description
jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Overview
- CVE ID
- CVE-2023-46123
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2023-10-25T00:13:00.565Z
- Last Modified Date
- 2023-10-25T00:13:00.565Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f | x_refsource_CONFIRM |
https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-46123 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46123 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 23:08:51 | Added to TrackCVE |