CVE-2020-4072
MEDIUMgenerator-jhipster-kotlin <1.7.0 - Info Disclosure
Title source: llmDescription
In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.
Scores
CVSS v3
5.3
EPSS
0.0030
EPSS Percentile
53.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Classification
CWE
CWE-117
Status
published
Affected Products (2)
jhipster/generator-jhipster-kotlin
< 1.7.0
npm/generator-jhipster-kotlin
< 1.7.0npm
Timeline
Published
Jun 25, 2020
Tracked Since
Feb 18, 2026