Improper Restriction of Excessive Authentication Attempts in github.com/jumpserver/coco
CVE-2023-42818
- github.com/jumpserver/coco
- github.com/jumpserver/jumpserver
- github.com/jumpserver/koko
- jumpserver/koko
Summary
JumpServer is an open source bastion host. When users enable MFA and use a public key for authentication, the Koko SSH server does not verify the corresponding SSH private key. An attacker could exploit a vulnerability by utilizing a disclosed public key to attempt brute-force authentication against the SSH service. This issue has been patched in versions 3.6.5 and 3.5.6. There are no known workarounds for this issue.
- LOW
- NETWORK
- HIGH
- UNCHANGED
- NONE
- NONE
- HIGH
- HIGH
CWE-307 - Improper Restriction of Excessive Authentication Attempts
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.
References
Advisory Timeline
- Published