Vulnerability Details : CVE-2023-42820
Potential exploit
JumpServer is an open source bastion host. This vulnerability is due to exposing the random number seed to the API, potentially allowing the randomly generated verification codes to be replayed, which could lead to password resets. If MFA is enabled users are not affect. Users not using local authentication are also not affected. Users are advised to upgrade to either version 2.28.19 or to 3.6.5. There are no known workarounds or this issue.
Vulnerability category: Information leak
Products affected by CVE-2023-42820
- cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
- cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-42820
24.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-42820
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N |
3.9
|
4.2
|
NIST | |
7.0
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L |
2.2
|
4.7
|
GitHub, Inc. |
CWE ids for CVE-2023-42820
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2023-42820
-
https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7prv-g565-82qp
Random seed leakage results in the user password being reset. · Advisory · jumpserver/jumpserver · GitHubVendor Advisory
-
https://github.com/jumpserver/jumpserver/commit/42337f0d00b2a8d45ef063eb5b7deeef81597da5
perf: 修复随机 error · jumpserver/jumpserver@42337f0 · GitHubPatch
Jump to