CVE-2019-11272
Summary
| CVE | CVE-2019-11272 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-26 14:15:00 UTC |
| Updated | 2021-06-08 18:21:00 UTC |
| Description | Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null". |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] [DLA 1848-1] libspring-security-2.0-java security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| CVE-2019-11272: PlaintextPasswordEncoder authenticates encoded passwords that are null | Security | Pivotal |
CONFIRM |
pivotal.io |
Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 982339 Java (maven) Security Update for org.springframework.security:spring-security-core (GHSA-v33x-prhc-gph5)