Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Link | Tags |
---|---|
https://pivotal.io/security/cve-2019-11272 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html | third party advisory mailing list |