CVE-2023-46123

jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*

History

25 Mar 2025, 20:15

Type Values Removed Values Added
References
  • () https://www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2 -
Summary (en) jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0. (en) jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.

21 Nov 2024, 08:27

Type Values Removed Values Added
References () https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - Release Notes () https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - Release Notes
References () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - Exploit, Vendor Advisory () https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - Exploit, Vendor Advisory

01 Nov 2023, 16:40

Type Values Removed Values Added
CWE CWE-307
CPE cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
First Time Fit2cloud
Fit2cloud jumpserver
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - (MISC) https://github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89f - Exploit, Vendor Advisory
References (MISC) https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - (MISC) https://github.com/jumpserver/jumpserver/releases/tag/v3.8.0 - Release Notes

25 Oct 2023, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-25 18:17

Updated : 2025-03-25 20:15


NVD link : CVE-2023-46123

Mitre link : CVE-2023-46123

CVE.ORG link : CVE-2023-46123


JSON object : View

Products Affected

fit2cloud

  • jumpserver
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts