CVE-2023-42442

Scores

EPSS

0.879high87.9%
0%20%40%60%80%100%

Percentile: 87.9%

CVSS

5.3medium3.x
0246810

CVSS Score: 5.3/10

All CVSS Scores

CVSS 3.x
5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Description

JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api /api/v1/terminal/sessions/ permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to [RBACPermission | IsSessionAssignee], relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api $HOST/api/v1/terminal/sessions/?limit=1. The expected http response code is 401 (not_authenticated).

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-287

Related Vulnerabilities

Exploits

Exploit ID: CVE-2023-42442

Source: github-poc

URL: https://github.com/C1ph3rX13/CVE-2023-42442

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: jumpserver

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.5.5",      "versionStartIncluding": "3.0.0",      "vulnerable": true    ...

Source: nvd

End of list