SB2023092675 - Multiple vulnerabilities in JumpServer



SB2023092675 - Multiple vulnerabilities in JumpServer

Published: September 26, 2023 Updated: April 27, 2026

Security Bulletin ID SB2023092675
CSH Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 vulnerabilities.


1) Path traversal (CVE-ID: CVE-2023-42819)

The vulnerability allows a remote user to disclose and modify arbitrary files on the system.

The vulnerability exists due to path traversal in the playbook file upload API endpoint when handling crafted file path parameters. A remote user can send a specially crafted request to disclose and modify arbitrary files on the system.

User interaction is required to create a playbook and obtain its identifier before exploitation.


2) Information disclosure (CVE-ID: CVE-2023-42820)

The vulnerability allows a remote attacker to reset user passwords.

The vulnerability exists due to exposure of the random number seed in the verification code generation process when handling password reset verification codes through the API. A remote attacker can replay randomly generated verification codes to reset user passwords.

Instances with MFA enabled are not affected. Deployments not using local authentication are also not affected.


Remediation

Install update from vendor's website.