Non-MFA account takeover via brute-force attack on weak password reset code in jumpserver
CVE-2023-43650

7.4HIGH

Key Information:

Vendor

Jumpserver

Vendor
CVE Published:
27 September 2023

What is CVE-2023-43650?

JumpServer is an open source bastion host that experiences a significant vulnerability due to weak verification code handling in its password reset feature. The lack of rate limiting allows attackers to make an excessive number of attempts on the 6-digit verification code sent to users, enabling potentially up to 1,000,000 validation attempts within a single minute. This flaw has been resolved in versions 2.28.20 and 3.7.1, and users are strongly encouraged to upgrade to mitigate risks associated with unauthorized password resets. There are currently no workarounds available to address this issue.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

jumpserver >= 2.0.0, < 2.28.20 < 2.0.0, 2.28.20

jumpserver >= 3.0.0, < 3.7.1 < 3.0.0, 3.7.1

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.