cve/2019/CVE-2019-11272.md

18 lines
874 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-11272](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11272)
![](https://img.shields.io/static/v1?label=Product&message=Spring%20Security&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%3A%20Improper%20Authentication%20-%20Generic&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon