Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pfxf-wh96-fvjc

Опубликовано: 25 июн. 2020
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

Log Forging in generator-jhipster-kotlin

Impact

We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html

This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.

Patches

version 1.7.0.

Workarounds

In AccountResource.kt you should change the line

log.warn("Password reset requested for non existing mail '$mail'");

to

log.warn("Password reset requested for non existing mail");

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

generator-jhipster-kotlin

npm
Затронутые версииВерсия исправления

= 1.6.0

1.7.0

EPSS

Процентиль: 53%
0.00304
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-117

Связанные уязвимости

CVSS3: 5.3
nvd
больше 5 лет назад

In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.

EPSS

Процентиль: 53%
0.00304
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-117