JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service This issue has been patched in versions 3.6.5 and 3.5.6. Users are advised to upgrade. There are no known workarounds for this issue.
References
| Link | Resource |
|---|---|
| https://github.com/jumpserver/jumpserver/security/advisories/GHSA-jv3c-27cv-w8jv | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-09-27 21:15
Updated : 2023-10-02 19:59
NVD link : CVE-2023-42818
Mitre link : CVE-2023-42818
CVE.ORG link : CVE-2023-42818
JSON object : View
Products Affected
fit2cloud
- jumpserver
