The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2430 | The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed. |
Github GHSA |
GHSA-3h68-wvv6-8r5h | Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T06:53:59.869Z
Reserved: 2019-12-02T00:00:00
Link: CVE-2020-1940
No data.
Status : Modified
Published: 2020-01-28T17:15:12.193
Modified: 2024-11-21T05:11:39.760
Link: CVE-2020-1940
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA