Vulnerability Details : CVE-2023-28110
Jumpserver is a popular open source bastion host, and Koko is a Jumpserver component that is the Go version of coco, refactoring coco's SSH/SFTP service and Web Terminal service. Prior to version 2.28.8, using illegal tokens to connect to a Kubernetes cluster through Koko can result in the execution of dangerous commands that may disrupt the Koko container environment and affect normal usage. The vulnerability has been fixed in v2.28.8.
Products affected by CVE-2023-28110
- cpe:2.3:a:fit2cloud:koko:-:*:*:*:*:go:*:*
- cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-28110
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-28110
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
NIST | |
5.7
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H |
0.5
|
5.2
|
GitHub, Inc. |
CWE ids for CVE-2023-28110
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-28110
-
https://github.com/jumpserver/jumpserver/releases/tag/v2.28.8
Release v2.28.8 · jumpserver/jumpserver · GitHubPatch;Release Notes
-
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-6x5p-jm59-jh29
Command Injection for Kubernets Connection · Advisory · jumpserver/jumpserver · GitHubExploit;Vendor Advisory
Jump to