Insufficiently Protected Credentials and Improper Authentication in Spring Security
High severity
GitHub Reviewed
Published
Jun 27, 2019
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Jun 26, 2019
Reviewed
Jun 27, 2019
Published to the GitHub Advisory Database
Jun 27, 2019
Last updated
Jan 28, 2023
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.
References