CVE-2023-45140

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45140
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45140.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45140
Related
  • GHSA-pr4q-w883-pf5x
Published
2023-11-08T16:15:09Z
Modified
2025-05-28T10:37:06.628073Z
Severity
  • 4.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

The Bastion provides authentication, authorization, traceability and auditability for SSH accesses. SCP and SFTP plugins don't honor group-based JIT MFA. Establishing a SCP/SFTP connection through The Bastion via a group access where MFA is enforced does not ask for additional factor. This abnormal behavior only applies to per-group-based JIT MFA. Other MFA setup types, such as Immediate MFA, JIT MFA on a per-plugin basis and JIT MFA on a per-account basis are not affected. This issue has been patched in version 3.14.15.

References

Affected packages

Git / github.com/ovh/the-bastion

Affected ranges

Type
GIT
Repo
https://github.com/ovh/the-bastion
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v3.*

v3.00.00
v3.00.01
v3.00.02
v3.01.00
v3.01.01
v3.01.02
v3.01.03
v3.01.99-rc1
v3.01.99-rc2
v3.01.99-rc3
v3.01.99-rc4
v3.02.00
v3.03.00
v3.03.01
v3.03.99-rc1
v3.03.99-rc2
v3.04.00
v3.05.00
v3.05.01
v3.06.00
v3.07.00
v3.08.00
v3.08.01
v3.09.00
v3.09.00-rc1
v3.09.00-rc2
v3.09.00-rc3
v3.09.00-really
v3.09.02
v3.10.00
v3.11.00
v3.11.01
v3.11.02
v3.12.00
v3.13.00
v3.13.01
v3.14.00