In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0506 In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Github GHSA Github GHSA GHSA-pfxf-wh96-fvjc Log Forging in generator-jhipster-kotlin
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T07:52:20.910Z

Reserved: 2019-12-30T00:00:00

Link: CVE-2020-4072

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-25T20:15:11.350

Modified: 2024-11-21T05:32:15.273

Link: CVE-2020-4072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.