Lucene search

K
Fit2cloudJumpserver

4 matches found

CVE
CVE
added 2023/09/27 3:19 p.m.2626 views

CVE-2023-42820

JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authe...

8.2CVSS7.5AI score0.54081EPSS
In wildWeb
CVE
CVE
added 2023/09/27 3:19 p.m.2485 views

CVE-2023-42819

JumpServer is an open source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adabef-c38f-492d-bd92-832bacc3df5f'. An attacker can ...

8.9CVSS8.6AI score0.31442EPSS
Web
CVE
CVE
added 2023/09/27 7:15 p.m.55 views

CVE-2023-43650

JumpServer is an open source bastion host. The verification code for resetting user's password is vulnerable to brute-force attacks due to the absence of rate limiting. JumpServer provides a feature allowing users to reset forgotten passwords. Affected users are sent a 6-digit verification code, ra...

8.2CVSS7.9AI score0.00391EPSS
CVE
CVE
added 2023/09/15 9:15 p.m.49 views

CVE-2023-42442

JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affec...

8.2CVSS6.5AI score0.88365EPSS
Web