Description
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0506 | In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0. |
Github GHSA |
GHSA-pfxf-wh96-fvjc | Log Forging in generator-jhipster-kotlin |
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-04T07:52:20.910Z
Reserved: 2019-12-30T00:00:00.000Z
Link: CVE-2020-4072
No data.
Status : Modified
Published: 2020-06-25T20:15:11.350
Modified: 2024-11-21T05:32:15.273
Link: CVE-2020-4072
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA