{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T07:23:14.555","vulnerabilities":[{"cve":{"id":"CVE-2023-48193","sourceIdentifier":"cve@mitre.org","published":"2023-11-28T21:15:08.373","lastModified":"2024-11-21T08:31:11.587","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"cve@mitre.org","tags":["disputed"]}],"descriptions":[{"lang":"en","value":"Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can be run by authorized users who are allowed to execute files."},{"lang":"es","value":"La vulnerabilidad de permisos inseguros en JumpServer GPLv3 v.3.8.0 permite a un atacante remoto ejecutar código arbitrario omitiendo la función de filtrado de comandos."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fit2cloud:jumpserver:3.8.0:*:*:*:*:*:*:*","matchCriteriaId":"BEA14CBD-A40D-4DB1-B0F4-42E9C62A5B54"}]}]}],"references":[{"url":"http://jumpserver.com","source":"cve@mitre.org","tags":["Product"]},{"url":"https://blog.fit2cloud.com/?p=8cf83cd9-c23b-4625-9350-38926fb7f88e","source":"cve@mitre.org"},{"url":"https://github.com/296430468/lcc_test/blob/main/jumpserver_BUG.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/jumpserver/jumpserver","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/jumpserver/jumpserver/issues/13394","source":"cve@mitre.org"},{"url":"http://jumpserver.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://blog.fit2cloud.com/?p=8cf83cd9-c23b-4625-9350-38926fb7f88e","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/296430468/lcc_test/blob/main/jumpserver_BUG.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/jumpserver/jumpserver","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://github.com/jumpserver/jumpserver/issues/13394","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}