{"id":44482,"date":"2020-09-24T10:57:34","date_gmt":"2020-09-24T14:57:34","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/security-researchers-resolve-crypto-flaws-in-jhipster-apps-the-daily-swig.php"},"modified":"2020-09-24T10:57:34","modified_gmt":"2020-09-24T14:57:34","slug":"security-researchers-resolve-crypto-flaws-in-jhipster-apps-the-daily-swig","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/opensource-code\/security-researchers-resolve-crypto-flaws-in-jhipster-apps-the-daily-swig.php","title":{"rendered":"Security researchers resolve crypto flaws in JHipster apps &#8211; The Daily Swig"},"content":{"rendered":"<p><p>    John Leyden23 September 2020 at 11:27 UTC        Updated: 24 September 2020 at 13:10 UTC                                                        <\/p>\n<p>Nearly 4,000 pull requests were issued to fix dependant projects<\/p>\n<\/p>\n<p>UPDATED Security researchers have run a successfully exercise to refactor apps that inherited a cryptographic flaw from a vulnerable code generator, JHipster.<\/p>\n<p>Both JHipster and JHipster Kotlin were updated in late June to break their reliance on a weak pseudo-random number generator (PRNG).<\/p>\n<p>The vulnerability meant that an attacker who had obtained a password reset token from a JHipster or JHipster Kotlin generated service would be able to correctly predict future password reset tokens.<\/p>\n<p>This made it possible for an unauthorized third party to request an administrators password reset token in order to take over a privileged account.<\/p>\n<p>Web applications and microservices built using vulnerable version of either JHipster or JHipster Kotlin were not themselves fixed even after the code generating utilities were updated to fixed versions - JHipster 6.3.0 and JHipster Kotlin 1.2.0, respectively.<\/p>\n<p>Software engineer Jonathan Leitschuh estimated in early July that there were as many as 14,600 instances of vulnerable applications generated using vulnerable builds of JHipster on GitHub.<\/p>\n<p>BACKGROUND App generator tool JHipster Kotlin fixes fundamental cryptographic bug<\/p>\n<p>Over the course of 16 hours, 3,880 pull requests were issued to fix instances of CVE-2019-16303, the PRNG vulnerability in the JHipster code generator.<\/p>\n<p>The same underlying vulnerability also affected apps made using JHipster Kotlin.<\/p>\n<p>The root cause of the problem in the case of both JHipster and JHipster Kotlin was reliance on Apache Commons Lang 3 RandomStringUtils to handle PRNGs.<\/p>\n<p>The JHipster app patching exercise, supported by GitHub Security Lab, relied on a code refactoring tool developed by Jon Schneider of source code transformation startup Moderne.<\/p>\n<p>Leitschuh told The Daily Swig: We plan to do this sort of thing again in the future with other vulnerabilities, but hopefully ones that are more complex and less cookie cutter.<\/p>\n<p>JHipster is an open source package thats used to generate web applications and microservices. JHipster Kotlin performs the same functions to generate apps that are compatible with Kotlin, a modern cross-platform programming language.<\/p>\n<p>This story has been updated and revised to reflect that the refactoring exercise focused on JHipster-generated apps and not JHipster, as first and inaccurately reported.<\/p>\n<p>RECOMMENDED Critical XSS vulnerability in Instagrams Spark AR nets 14-year-old researcher $25,000<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/portswigger.net\/daily-swig\/security-researchers-resolve-crypto-flaws-in-jhipster-apps\" title=\"Security researchers resolve crypto flaws in JHipster apps - The Daily Swig\">Security researchers resolve crypto flaws in JHipster apps - The Daily Swig<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> John Leyden23 September 2020 at 11:27 UTC Updated: 24 September 2020 at 13:10 UTC Nearly 4,000 pull requests were issued to fix dependant projects UPDATED Security researchers have run a successfully exercise to refactor apps that inherited a cryptographic flaw from a vulnerable code generator, JHipster. Both JHipster and JHipster Kotlin were updated in late June to break their reliance on a weak pseudo-random number generator (PRNG)<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[78317],"tags":[],"class_list":["post-44482","post","type-post","status-publish","format-standard","hentry","category-opensource-code"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/44482"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=44482"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/44482\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=44482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=44482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=44482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}