CVE-2023-46123

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-46123
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-46123.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-46123
Aliases
  • GHSA-hvw4-766m-p89f
Published
2023-10-25T00:13:00.565Z
Modified
2025-11-29T10:09:26.733203Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
jumpserver is vulnerable to password brute-force protection bypass via arbitrary IP values
Details

jumpserver is an open source bastion machine, professional operation and maintenance security audit system that complies with 4A specifications. A flaw in the Core API allows attackers to bypass password brute-force protections by spoofing arbitrary IP addresses. By exploiting this vulnerability, attackers can effectively make unlimited password attempts by altering their apparent IP address for each request. This vulnerability has been patched in version 3.8.0.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/46xxx/CVE-2023-46123.json",
    "cwe_ids": [
        "CWE-307"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/jumpserver/jumpserver

Affected ranges

Type
GIT
Repo
https://github.com/jumpserver/jumpserver
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed