In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
References
Link | Resource |
---|---|
https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449 | Patch Third Party Advisory |
https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc | Third Party Advisory |
https://owasp.org/www-community/attacks/Log_Injection | Technical Description |
https://www.baeldung.com/jvm-log-forging | Technical Description |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-06-25T20:05:15
Updated: 2020-06-25T20:05:15
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-4072
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-25T20:15:11.350
Modified: 2020-07-10T21:20:34.387
Link: CVE-2020-4072
JSON object: View
Redhat Information
No data.
CWE