Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2019-11272 | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html | Mailing List Third Party Advisory |
Information
Published : 2019-06-26 07:15
Updated : 2021-06-08 11:21
NVD link : CVE-2019-11272
Mitre link : CVE-2019-11272
JSON object : View
CWE
CWE-522
Insufficiently Protected Credentials
Products Affected
debian
- debian_linux
vmware
- spring_security