First published: Thu Jun 20 2019(Updated: )
A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of "null."
Credit: security@pivotal.io
Affected Software | Affected Version | How to fix |
---|---|---|
IBM GDE | <=3.0.0.2 | |
Vmware Spring Security | >=4.2.0<=4.2.12 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11272 is a vulnerability in Pivotal Spring Security that could allow a remote attacker to bypass security restrictions caused by a plain text password.
Spring Security versions 4.2.x up to 4.2.12, and older unsupported versions are affected by CVE-2019-11272.
A remote attacker can exploit CVE-2019-11272 by leveraging a null encoded password when an application is using the affected version of Spring Security with PlaintextPasswordEncoder.
CVE-2019-11272 has a severity rating of 7.3 (high).
To fix CVE-2019-11272, it is recommended to upgrade to a patched version of Spring Security (4.2.13 or later) or apply the necessary security updates provided by the vendor.