GHSA-mwp6-j9wf-968c

Suggest an improvement
Source
https://github.com/advisories/GHSA-mwp6-j9wf-968c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/09/GHSA-mwp6-j9wf-968c/GHSA-mwp6-j9wf-968c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mwp6-j9wf-968c
Related
Withdrawn
2020-06-26T16:40:47Z
Published
2019-09-13T21:33:25Z
Modified
2021-10-11T21:10:33Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Critical severity vulnerability that affects generator-jhipster
Details

Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html

Database specific
{
    "severity": "CRITICAL",
    "github_reviewed_at": "2020-06-16T21:47:33Z",
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-338"
    ],
    "github_reviewed": true
}
References

Affected packages

npm / generator-jhipster

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.0