CVE-2020-4072

MEDIUM

generator-jhipster-kotlin <1.7.0 - Info Disclosure

Title source: llm
STIX 2.1

Description

In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.

Scores

CVSS v3 5.3
EPSS 0.0030
EPSS Percentile 53.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Details

CWE
CWE-117
Status published
Products (2)
jhipster/generator-jhipster-kotlin < 1.7.0
npm/generator-jhipster-kotlin 1.6.0 - 1.7.0npm
Published Jun 25, 2020
Tracked Since Feb 18, 2026