CVE-2023-42820
Random seed leakage in Jumpserver
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
JumpServer es un host bastionado de código abierto. Esta vulnerabilidad se debe a la exposición de la seed de número aleatorio a la API, lo que potencialmente permite que se reproduzcan los códigos de verificación generados aleatoriamente, lo que podría provocar restablecimientos de contraseña. Si MFA está habilitado, los usuarios no se ven afectados. Los usuarios que no utilizan la autenticación local tampoco se ven afectados. Se recomienda a los usuarios que actualicen a la versión 2.28.19 o 3.6.5. No se conocen workarounds para este problema.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-09-14 CVE Reserved
- 2023-09-26 CVE Published
- 2024-04-03 First Exploit
- 2024-09-23 CVE Updated
- 2024-10-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/C1ph3rX13/CVE-2023-42820 | 2024-04-03 |
URL | Date | SRC |
---|---|---|
https://github.com/jumpserver/jumpserver/commit/42337f0d00b2a8d45ef063eb5b7deeef81597da5 | 2023-09-29 |
URL | Date | SRC |
---|---|---|
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp | 2023-09-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fit2cloud Search vendor "Fit2cloud" | Jumpserver Search vendor "Fit2cloud" for product "Jumpserver" | >= 2.24.0 < 2.28.19 Search vendor "Fit2cloud" for product "Jumpserver" and version " >= 2.24.0 < 2.28.19" | - |
Affected
| ||||||
Fit2cloud Search vendor "Fit2cloud" | Jumpserver Search vendor "Fit2cloud" for product "Jumpserver" | >= 3.0.0 < 3.6.5 Search vendor "Fit2cloud" for product "Jumpserver" and version " >= 3.0.0 < 3.6.5" | - |
Affected
|