Non-MFA account takeover via brute-force attack on weak password reset code in jumpserver
CVE-2023-43650
What is CVE-2023-43650?
JumpServer is an open source bastion host that experiences a significant vulnerability due to weak verification code handling in its password reset feature. The lack of rate limiting allows attackers to make an excessive number of attempts on the 6-digit verification code sent to users, enabling potentially up to 1,000,000 validation attempts within a single minute. This flaw has been resolved in versions 2.28.20 and 3.7.1, and users are strongly encouraged to upgrade to mitigate risks associated with unauthorized password resets. There are currently no workarounds available to address this issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
jumpserver >= 2.0.0, < 2.28.20 < 2.0.0, 2.28.20
jumpserver >= 3.0.0, < 3.7.1 < 3.0.0, 3.7.1
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
