CVE-2019-11272: PlaintextPasswordEncoder authenticates encoded passwords that are null
Spring by Pivotal
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of “null”.
Severity is low unless otherwise noted.
- Spring Security 4.2 to 4.2.12
- Older unsupported versions are also affected
- Note that Spring Security 5+ is not impacted by this vulnerability.
Users of affected versions should apply the following mitigation:
- 4.2.x users should upgrade to 4.2.13
- Older versions should upgrade to a supported branch
There are no other mitigation steps necessary.
This issue was identified and responsibly reported by Tim Büthe and Daniel Neagaru from mytaxi.
2019-06-19: Initial vulnerability report published