CVE-2019-11272

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:spring_security:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html - Mailing List, Third Party Advisory
References () https://pivotal.io/security/cve-2019-11272 - Vendor Advisory () https://pivotal.io/security/cve-2019-11272 - Vendor Advisory

Information

Published : 2019-06-26 14:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11272

Mitre link : CVE-2019-11272

CVE.ORG link : CVE-2019-11272


JSON object : View

Products Affected

debian

  • debian_linux

vmware

  • spring_security
CWE
CWE-287

Improper Authentication

CWE-522

Insufficiently Protected Credentials