Description
The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2430 | The optional initial password change and password expiration features present in Apache Jackrabbit Oak 1.2.0 to 1.22.0 are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed. |
Github GHSA |
GHSA-3h68-wvv6-8r5h | Improper Removal of Sensitive Information Before Storage or Transfer in Apache Jackrabbit Oak |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T06:53:59.869Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1940
No data.
Status : Modified
Published: 2020-01-28T17:15:12.193
Modified: 2024-11-21T05:11:39.760
Link: CVE-2020-1940
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA