High severity vulnerability that affects generator-jhipster
High severity
GitHub Reviewed
Published
Sep 20, 2019
in
jhipster/generator-jhipster
•
Updated Jan 9, 2023
Description
Published to the GitHub Advisory Database
Sep 23, 2019
Reviewed
Jun 16, 2020
Last updated
Jan 9, 2023
Generated code uses repository configuration that downloads over HTTP instead of HTTPS
Impact
Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time.
Patches
Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1.
If you are not able to upgrade make sure not to use a Maven repository via
http
in your build file.Workarounds
Replace all custom repository definitions in
build.gradle
orpom.xml
with theirhttps
version.e.g.
References
For more information
If you have any questions or comments about this advisory:
References