Information Exposure Affecting org.apache.jackrabbit:oak-core package, versions [,1.4.25)[1.6.0,1.6.20)[1.8.0,1.8.20)[1.10.0,1.10.8)[1.12.0, 1.22.1)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.33% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHEJACKRABBIT-543625
  • published29 Jan 2020
  • disclosed28 Jan 2020
  • creditAndrew Khoury and Russ Wright

Introduced: 28 Jan 2020

CVE-2020-1940  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.jackrabbit:oak-core to version 1.4.25, 1.6.20, 1.8.20, 1.10.8, 1.22.1 or higher.

Overview

org.apache.jackrabbit:oak-core is a complementary implementation of the JCR specification.

Affected versions of this package are vulnerable to Information Exposure. The optional initial password change and password expiration features are prone to a sensitive information disclosure vulnerability. The code mandates the changed password to be passed as an additional attribute to the credentials object but does not remove it upon processing during the first phase of the authentication. In combination with additional, independent authentication mechanisms, this may lead to the new password being disclosed.

CVSS Scores

version 3.1