You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This project has been used to generate PRs that automatically fix a security vulnerability in Maven POM files that
are using HTTP instead of HTTPS to resolve dependencies.
Pull Requests Generated: 1,596
Project 1.5: Prevent rhostname array overflow
GitHub Security Lab's pwntester leveraged this project to generate pull requests to fix an array overflow. This is a variant of CVE-2020-8597.
The vulnerability occurs because, given that vallen was checked to be less than len, it can never be the case that vallen >= len + sizeof(rhostname). Therefore, rhostname never gets trimmed and the rhostname array may overflow.
Project 2: CVE-2019-16303 - JHipster Vulnerability Fix - Use CSPRNG in RandomUtil
In 2019, I discovered a vulnerability in the JHipster code generator where it was
generating vulnerable implementations of a class called RandomUtil.java.
Using one password reset token from these apps combined with the POC below, an attacker can determine all future password
reset tokens to be generated by these vulnerable servers.
This would allow an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts.
POC code has existed since March 3rd, 2018 for taking one RNG value generated by RandomStringUtils and reversing it to generate all of the past/future RNG values.
The fix was generated for each vulnerable file, preserving the original style of the file, by the Rewrite project.
See the specific code for this fix here.
Pull Requests Generated: 3,880
About
Generate thousands of pull requests to fix widespread security vulnerabilities across GitHub.