CVE-2024-24763
- EPSS 26.41%
- Veröffentlicht 20.02.2024 18:15:52
- Zuletzt bearbeitet 17.12.2024 20:03:30
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phi...
CVE-2023-48193
- EPSS 3.85%
- Veröffentlicht 28.11.2023 21:15:08
- Zuletzt bearbeitet 21.11.2024 08:31:11
Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can...
CVE-2023-46138
- EPSS 0.04%
- Veröffentlicht 31.10.2023 00:15:10
- Zuletzt bearbeitet 21.11.2024 08:27:57
JumpServer is an open source bastion host and maintenance security audit system that complies with 4A specifications. Prior to version 3.8.0, the default email for initial user admin is `admin[@]mycompany[.]com`, and users reset their passwords by se...
CVE-2023-46123
- EPSS 0.44%
- Veröffentlicht 25.10.2023 18:17:36
- Zuletzt bearbeitet 25.03.2025 20:15:20
jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary ...
CVE-2023-43651
- EPSS 13.92%
- Veröffentlicht 27.09.2023 21:15:10
- Zuletzt bearbeitet 25.03.2025 20:15:19
JumpServer is an open source bastion host. An authenticated user can exploit a vulnerability in MongoDB sessions to execute arbitrary commands, leading to remote code execution. This vulnerability may further be leveraged to gain root privileges on t...
CVE-2023-42818
- EPSS 0.16%
- Veröffentlicht 27.09.2023 21:15:10
- Zuletzt bearbeitet 25.03.2025 20:15:19
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public...
CVE-2023-43652
- EPSS 0.63%
- Veröffentlicht 27.09.2023 19:15:12
- Zuletzt bearbeitet 27.05.2025 21:24:18
JumpServer is an open source bastion host. As an unauthenticated user, it is possible to authenticate to the core API with a username and an SSH public key without needing a password or the corresponding SSH private key. An SSH public key should be c...
CVE-2023-43650
- EPSS 0.39%
- Veröffentlicht 27.09.2023 19:15:11
- Zuletzt bearbeitet 21.04.2025 14:32:27
JumpServer is an open source bastion host. The verification code for resetting user's password is vulnerable to brute-force attacks due to the absence of rate limiting. JumpServer provides a feature allowing users to reset forgotten passwords. Affect...
CVE-2023-42820
- EPSS 62.79%
- Veröffentlicht 27.09.2023 15:19:33
- Zuletzt bearbeitet 21.11.2024 08:23:17
JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled ...
CVE-2023-42819
- EPSS 36.91%
- Veröffentlicht 27.09.2023 15:19:33
- Zuletzt bearbeitet 21.11.2024 08:23:16
JumpServer is an open source bastion host. Logged-in users can access and modify the contents of any file on the system. A user can use the 'Job-Template' menu and create a playbook named 'test'. Get the playbook id from the detail page, like 'e0adab...