Vulnerability Details : CVE-2020-4072
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Products affected by CVE-2020-4072
- cpe:2.3:a:jhipster:generator-jhipster-kotlin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-4072
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-4072
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2020-4072
-
The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.Assigned by: security-advisories@github.com (Primary)
References for CVE-2020-4072
-
https://www.baeldung.com/jvm-log-forging
JVM Log Forging | BaeldungTechnical Description
-
https://owasp.org/www-community/attacks/Log_Injection
Log Injection Software Attack | OWASP FoundationTechnical Description
-
https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc
Log Forging Vulnerability · Advisory · jhipster/jhipster-kotlin · GitHubThird Party Advisory
-
https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449
prevent log forging when doing password reset init request · jhipster/jhipster-kotlin@426ccab · GitHubPatch;Third Party Advisory
Jump to