Skip to content

Commit 4e28036

Browse files
committed
Update README.md
1 parent d0cfd8a commit 4e28036

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

README.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,21 @@ vulnerabilities.
2121

2222
This project has been used to generate PRs that automatically fix a security vulnerability in Maven POM files that
2323
are using HTTP instead of HTTPS to resolve dependencies.
24+
25+
**Pull Requests Generated: 1,596**
26+
27+
## Project 2: CVE-2019-16303 - JHipster Vulnerability Fix - Use CSPRNG in RandomUtil
28+
29+
In 2019, I discovered a vulnerability in the [JHipster](https://www.jhipster.tech/) code generator where it was
30+
generating vulnerable implementations of a class called `RandomUtil.java`.
31+
32+
Using one password reset token from these apps combined with the POC below, an attacker can determine all future password
33+
reset tokens to be generated by these vulnerable servers.
34+
This would allow an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts.
35+
36+
[POC code](http://web.archive.org/web/20191126104359/https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd) has existed since March 3rd, 2018 for taking one RNG value generated by `RandomStringUtils` and reversing it to generate all of the past/future RNG values.
37+
38+
The fix was generated for each vulnerable file, preserving the original style of the file, by the [Rewrite project](https://github.com/openrewrite/rewrite).
39+
See the specific code for this fix [here](https://github.com/moderneinc/jhipster-cwe-338).
40+
41+
**Pull Requests Generated: 3,880**

0 commit comments

Comments
 (0)