Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-4072
HistoryJun 25, 2020 - 8:05 p.m.

CVE-2020-4072 Log Forging in generator-jhipster-kotlin

2020-06-2520:05:15
CWE-117
GitHub_M
www.cve.org
2

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.002

Percentile

60.8%

In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.

CNA Affected

[
  {
    "product": "jhipster-kotlin",
    "vendor": "jhipster",
    "versions": [
      {
        "status": "affected",
        "version": "= 1.6.0"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

EPSS

0.002

Percentile

60.8%

Related for CVELIST:CVE-2020-4072