Описание
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- Technical Description
- Technical Description
- PatchThird Party Advisory
- Third Party Advisory
- Technical Description
- Technical Description
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.0 (исключая)
cpe:2.3:a:jhipster:generator-jhipster-kotlin:*:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.00304
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-117
Связанные уязвимости
EPSS
Процентиль: 53%
0.00304
Низкий
5.3 Medium
CVSS3
5 Medium
CVSS2
Дефекты
CWE-117