CVE-2023-45140

The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ovh:the-bastion:*:*:*:*:*:*:*:*

History

16 Nov 2023, 18:50

Type Values Removed Values Added
CPE cpe:2.3:a:ovh:the-bastion:*:*:*:*:*:*:*:*
References () https://github.com/ovh/the-bastion/releases/tag/v3.14.15 - () https://github.com/ovh/the-bastion/releases/tag/v3.14.15 - Patch
References () https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x - () https://github.com/ovh/the-bastion/security/advisories/GHSA-pr4q-w883-pf5x - Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.6
First Time Ovh the-bastion
Ovh

08 Nov 2023, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-08 16:15

Updated : 2023-11-16 18:50


NVD link : CVE-2023-45140

Mitre link : CVE-2023-45140


JSON object : View

Products Affected

ovh

  • the-bastion
CWE

No CWE.