jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
References
Configurations
History
25 Mar 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - Exploit, Vendor Advisory | |
References | () https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - Release Notes | |
Summary | jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0. |
01 Nov 2023, 16:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-307 | |
References | (MISC) https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - Release Notes | |
References | (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - Exploit, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CPE | cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:* | |
First Time |
Fit2cloud jumpserver
Fit2cloud |
25 Oct 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-25 18:17
Updated : 2025-03-25 20:15
NVD link : CVE-2023-46123
Mitre link : CVE-2023-46123
JSON object : View
Products Affected
fit2cloud
- jumpserver
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts