CVE-2023-42442

Published on: Not Yet Published

Last Modified on: 09/20/2023 07:33:00 PM UTC

CVE-2023-42442 - advisory for GHSA-633x-3f4f-v9rw

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Certain versions of Jumpserver from Fit2cloud contain the following vulnerability:

JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).

  • CVE-2023-42442 has been assigned by URL Logo security-adviso[email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • Affected Vendor/Software: URL Logo jumpserver - jumpserver version = >= 3.0.0, < 3.5.5
  • Affected Vendor/Software: URL Logo jumpserver - jumpserver version = >= 3.6.0, < 3.6.4

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVE References

Description Tags Link
fix: 修复 private storage permission · jumpserver/jumpserver@0a58bba · GitHub github.com
text/html
URL Logo MISC github.com/jumpserver/jumpserver/commit/0a58bba59cd275bab8e0ae58bf4b359fbc5eb74a
github.com
text/plain
URL Logo MISC github.com/jumpserver/jumpserver/blob/v3.6.1/apps/terminal/api/session/session.py#L91
Session replays download without authentication · Advisory · jumpserver/jumpserver · GitHub github.com
text/html
URL Logo MISC github.com/jumpserver/jumpserver/security/advisories/GHSA-633x-3f4f-v9rw

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFit2cloudJumpserverAllAllAllAll
  • cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*:
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report