Lucene search

K
osvGoogleOSV:GHSA-PFXF-WH96-FVJC
HistoryJun 25, 2020 - 8:02 p.m.

Log Forging in generator-jhipster-kotlin

2020-06-2520:02:51
Google
osv.dev
8

0.002 Low

EPSS

Percentile

60.9%

Impact

We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html

This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.

Patches

version 1.7.0.

Workarounds

In AccountResource.kt you should change the line

 log.warn("Password reset requested for non existing mail '$mail'");

to

 log.warn("Password reset requested for non existing mail");

References

For more information

If you have any questions or comments about this advisory:

CPENameOperatorVersion
generator-jhipster-kotlineq1.6.0

0.002 Low

EPSS

Percentile

60.9%

Related for OSV:GHSA-PFXF-WH96-FVJC