Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html | Mailing List Third Party Advisory |
https://pivotal.io/security/cve-2019-11272 | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html | Mailing List Third Party Advisory |
https://pivotal.io/security/cve-2019-11272 | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://pivotal.io/security/cve-2019-11272 - Vendor Advisory |
Information
Published : 2019-06-26 14:15
Updated : 2024-11-21 04:20
NVD link : CVE-2019-11272
Mitre link : CVE-2019-11272
CVE.ORG link : CVE-2019-11272
JSON object : View
Products Affected
debian
- debian_linux
vmware
- spring_security