Description
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Published: 2020-06-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0506 In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Github GHSA Github GHSA GHSA-pfxf-wh96-fvjc Log Forging in generator-jhipster-kotlin
History

No history.

Subscriptions

Jhipster Generator-jhipster-kotlin
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T07:52:20.910Z

Reserved: 2019-12-30T00:00:00.000Z

Link: CVE-2020-4072

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-25T20:15:11.350

Modified: 2024-11-21T05:32:15.273

Link: CVE-2020-4072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses