Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBmeGYtd2g5Ni1mdmpj
Log Forging in generator-jhipster-kotlin
Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.
Patches
version 1.7.0.
Workarounds
In AccountResource.kt
you should change the line
log.warn("Password reset requested for non existing mail '$mail'");
to
log.warn("Password reset requested for non existing mail");
References
- https://cwe.mitre.org/data/definitions/117.html
- https://owasp.org/www-community/attacks/Log_Injection
- https://www.baeldung.com/jvm-log-forging
For more information
If you have any questions or comments about this advisory:
- Open an issue in jhipster kotlin
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXBmeGYtd2g5Ni1mdmpj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 4 years ago
Updated: over 1 year ago
CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Identifiers: GHSA-pfxf-wh96-fvjc, CVE-2020-4072
References:
- https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc
- https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449
- https://owasp.org/www-community/attacks/Log_Injection
- https://www.baeldung.com/jvm-log-forging
- https://nvd.nist.gov/vuln/detail/CVE-2020-4072
- https://github.com/advisories/GHSA-pfxf-wh96-fvjc
Blast Radius: 8.7
Affected Packages
npm:generator-jhipster-kotlin
Dependent packages: 3Dependent repositories: 43
Downloads: 1,928 last month
Affected Version Ranges: = 1.6.0
Fixed in: 1.7.0
All affected versions: 1.6.0
All unaffected versions: 0.0.0, 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.1.0, 0.2.0, 0.2.1, 0.3.0, 0.4.0, 0.5.0, 0.6.0, 0.6.1, 0.7.0, 0.8.0, 0.8.1, 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.7.0, 1.8.0, 1.8.1, 1.9.0, 1.10.0, 1.11.0, 1.12.0, 1.12.1, 1.13.0, 1.14.0, 1.15.0, 1.16.0