Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-43652
HistorySep 27, 2023 - 6:31 p.m.

CVE-2023-43652 Non-MFA account takeover via using only SSH public key to login in jumpserver

2023-09-2718:31:41
CWE-862
GitHub_M
www.cve.org
1
cve-2023-43652
non-mfa
account takeover
ssh
public key
jumpserver
authentication
security
vulnerability
api
koko component
authentication token
upgrade

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.1%

JumpServer is an open source bastion host. As an unauthenticated user, it is possible to authenticate to the core API with a username and an SSH public key without needing a password or the corresponding SSH private key. An SSH public key should be considered public knowledge and should not used as an authentication secret alone. JumpServer provides an API for the KoKo component to validate user private key logins. This API does not verify the source of requests and will generate a personal authentication token. Given that public keys can be easily leaked, an attacker can exploit the leaked public key and username to authenticate, subsequently gaining access to the current user’s information and authorized actions. This issue has been addressed in versions 2.28.20 and 3.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "jumpserver",
    "product": "jumpserver",
    "versions": [
      {
        "version": ">= 2.0.0, < 2.28.20",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0, < 3.7.1",
        "status": "affected"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

9.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.1%

Related for CVELIST:CVE-2023-43652