Описание
Log Forging in generator-jhipster-kotlin
Impact
We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
Patches
version 1.7.0.
Workarounds
In AccountResource.kt you should change the line
to
References
- https://cwe.mitre.org/data/definitions/117.html
- https://owasp.org/www-community/attacks/Log_Injection
- https://www.baeldung.com/jvm-log-forging
For more information
If you have any questions or comments about this advisory:
- Open an issue in jhipster kotlin
Ссылки
- https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc
- https://nvd.nist.gov/vuln/detail/CVE-2020-4072
- https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449
- https://owasp.org/www-community/attacks/Log_Injection
- https://www.baeldung.com/jvm-log-forging
Пакеты
generator-jhipster-kotlin
= 1.6.0
1.7.0
Связанные уязвимости
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.