CVE-2020-4072

MEDIUM

generator-jhipster-kotlin <1.7.0 - Info Disclosure

Title source: llm

Description

In generator-jhipster-kotlin version 1.6.0 log entries are created for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. This issue has been fixed in version 1.7.0.

Scores

CVSS v3 5.3
EPSS 0.0030
EPSS Percentile 53.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Classification

CWE
CWE-117
Status published

Affected Products (2)

jhipster/generator-jhipster-kotlin < 1.7.0
npm/generator-jhipster-kotlin < 1.7.0npm

Timeline

Published Jun 25, 2020
Tracked Since Feb 18, 2026