generator-jhipster@4.5.3 vulnerabilities

Spring Boot + Angular/React/Vue in one handy generator

Direct Vulnerabilities

Known vulnerabilities in the generator-jhipster package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Incorrect Authorization

generator-jhipster is a development platform to generate, develop and deploy Spring Boot + Angular / React / Vue Web applications and Spring microservices.

Affected versions of this package are vulnerable to Incorrect Authorization via the authorities parameter in the response from the api/account endpoint. An attacker can gain elevated privileges by modifying the value of the authorities parameter for ROLE_USER to ROLE_ADMIN.

Note: The reporter of this vulnerability claims that the project maintainers do not intend to release a fix.

How to fix Incorrect Authorization?

There is no fixed version for generator-jhipster.

*
  • M
Information Exposure

generator-jhipster is a development platform to generate, develop and deploy Spring Boot + Angular / React / Vue Web applications and Spring microservices.

Affected versions of this package are vulnerable to Information Exposure. On the user management webpage: http://localhost:8080/admin/user-management, it is possible to sort columns and the following URL can be observed when sorting by Login: http://localhost:8080/admin/user-management?page=1&sort=login,desc

The data displayed on the screen is from the generators/server/templates/src/main/java/package/domain/User.java.ejs which contains data from the jhi_user database table. The issue is that some properties of the model contain security related data and that an administrator can sort them out. For example: http://localhost:8080/admin/user-management?page=1&sort=password,desc In this case, the password property is the password_hash column of the database.

How to fix Information Exposure?

Upgrade generator-jhipster to version 6.10.2 or higher.

<6.10.2
  • M
Improper Output Neutralization for Logs

generator-jhipster is a development platform to generate, develop and deploy Spring Boot + Angular / React / Vue Web applications and Spring microservices.

Affected versions of this package are vulnerable to Improper Output Neutralization for Logs. User-provided text can be used to forge logs when using the API.

How to fix Improper Output Neutralization for Logs?

Upgrade generator-jhipster to version 6.9.0 or higher.

<6.9.0
  • H
Unsafe Dependency Resolution

generator-jhipster is a development platform to generate, develop and deploy Spring Boot + Angular / React / Vue Web applications and Spring microservices.

Affected versions of this package are vulnerable to Unsafe Dependency Resolution. Generated code uses repository configuration that downloads over HTTP instead of HTTPS

How to fix Unsafe Dependency Resolution?

Upgrade generator-jhipster to version 6.3.1 or higher.

<6.3.1
  • H
Insecure Randomness

generator-jhipster is a development platform to generate, develop and deploy Spring Boot + Angular / React / Vue Web applications and Spring microservices.

Affected versions of this package are vulnerable to Insecure Randomness. Uses an insecure source of randomness to generate all of its random values as it relies upon apache commons lang3 RandomStringUtils. This allows an attacker (if able to obtain their own password reset URL) to compute the value for all other password resets for other accounts, thus allowing privilege escalation or account takeover.

How to fix Insecure Randomness?

Upgrade generator-jhipster to version 6.3.0 or higher.

<6.3.0