Unrated severityNVD Advisory· Published Oct 25, 2023· Updated Mar 25, 2025
jumpserver is vulnerable to password brute-force protection bypass via arbitrary IP values
CVE-2023-46123
Description
jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.
Affected products
1- Range: < 3.8.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/jumpserver/jumpserver/releases/tag/v3.8.0mitrex_refsource_MISC
- github.com/jumpserver/jumpserver/security/advisories/GHSA-hvw4-766m-p89fmitrex_refsource_CONFIRM
- www.sonarsource.com/blog/diving-into-jumpserver-attackers-gateway-to-internal-networks-1-2mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.