CVE-2023-45140

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45140
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45140.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45140
Aliases
  • GHSA-pr4q-w883-pf5x
Published
2023-11-08T15:26:26.584Z
Modified
2025-12-05T00:08:15.944614Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Group-based JIT MFA bypass on scp and sftp in The Bastion
Details

The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.

Database specific
{
    "cwe_ids": [
        "CWE-306"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/45xxx/CVE-2023-45140.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/ovh/the-bastion

Affected ranges

Type
GIT
Repo
https://github.com/ovh/the-bastion
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v3.*

v3.00.00
v3.00.01
v3.00.02
v3.01.00
v3.01.01
v3.01.02
v3.01.03
v3.01.99-rc1
v3.01.99-rc2
v3.01.99-rc3
v3.01.99-rc4
v3.02.00
v3.03.00
v3.03.01
v3.03.99-rc1
v3.03.99-rc2
v3.04.00
v3.05.00
v3.05.01
v3.06.00
v3.07.00
v3.08.00
v3.08.01
v3.09.00
v3.09.00-rc1
v3.09.00-rc2
v3.09.00-rc3
v3.09.00-really
v3.09.02
v3.10.00
v3.11.00
v3.11.01
v3.11.02
v3.12.00
v3.13.00
v3.13.01
v3.14.00

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45140.json"