GHSA-pfxf-wh96-fvjc

Suggest an improvement
Source
https://github.com/advisories/GHSA-pfxf-wh96-fvjc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/06/GHSA-pfxf-wh96-fvjc/GHSA-pfxf-wh96-fvjc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pfxf-wh96-fvjc
Aliases
Related
Published
2020-06-25T20:02:51Z
Modified
2023-11-08T04:03:50.700066Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Log Forging in generator-jhipster-kotlin
Details

Impact

We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html

This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable.

Patches

version 1.7.0.

Workarounds

In AccountResource.kt you should change the line

 log.warn("Password reset requested for non existing mail '$mail'");

to

 log.warn("Password reset requested for non existing mail");

References

  • https://cwe.mitre.org/data/definitions/117.html
  • https://owasp.org/www-community/attacks/Log_Injection
  • https://www.baeldung.com/jvm-log-forging

For more information

If you have any questions or comments about this advisory: * Open an issue in jhipster kotlin

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-06-25T20:02:31Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-117"
    ]
}
References

Affected packages

npm / generator-jhipster-kotlin

Package

Name
generator-jhipster-kotlin
View open source insights on deps.dev
Purl
pkg:npm/generator-jhipster-kotlin

Affected ranges

Type
SEMVER
Events
Introduced
1.6.0
Fixed
1.7.0

Affected versions

1.*

1.6.0