Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11272

Опубликовано: 11 июл. 2019
Источник: redhat
CVSS3: 7.3

Описание

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".

A flaw was found in Spring Security in several versions, in the use of plain text passwords using the PlaintextPasswordEncoder. If an application is using an affected version of Spring Security with the PlaintextPasswordEncoder and a user has a null encoded password, an attacker can use this flaw to authenticate using a password of "null."

Отчет

Red Hat OpenStack Platform's OpenDaylight versions 9 and 10 contain the vulnerable code. However, these OpenDaylight versions were released as technical preview with limited support and will therefore not be updated. Other OpenDaylight versions do not contain the vulnerable library.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Fuse 6spring-security-coreOut of support scope
Red Hat OpenStack Platform 10 (Newton)opendaylightNot affected
Red Hat OpenStack Platform 13 (Queens)opendaylightNot affected
Red Hat OpenStack Platform 14 (Rocky)opendaylightNot affected
Red Hat OpenStack Platform 8 (Liberty)opendaylightWill not fix
Red Hat OpenStack Platform 9 (Mitaka)opendaylightWill not fix
Red Hat Fuse 7.6.0spring-security-coreFixedRHSA-2020:098326.03.2020

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1728993spring-security-core: mishandling of user passwords allows logging in with a password of NULL

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
больше 6 лет назад

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".

CVSS3: 7.3
nvd
больше 6 лет назад

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".

CVSS3: 7.3
debian
больше 6 лет назад

Spring Security, versions 4.2.x up to 4.2.12, and older unsupported ve ...

CVSS3: 7.3
github
больше 6 лет назад

Insufficiently Protected Credentials and Improper Authentication in Spring Security

CVSS3: 7.3
fstec
больше 6 лет назад

Уязвимость реализации класса PlaintextPasswordEncoder Java-фреймворка для обеспечения безопасности промышленных приложений Spring Security, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

7.3 High

CVSS3