Lucene search

K
githubGitHub Advisory DatabaseGHSA-3533-RVPC-6X56
HistoryMay 17, 2022 - 5:17 a.m.

Exposure of Sensitive Information to an Unauthorized Actor in Spring Security

2022-05-1705:17:30
CWE-200
GitHub Advisory Database
github.com
19
sensitive information exposure
unauthorized access
daoauthenticationprovider
vmware
remote attack

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

68.3%

DaoAuthenticationProvider in VMware SpringSource Spring Security before 2.0.8, 3.0.x before 3.0.8, and 3.1.x before 3.1.3 does not check the password if the user is not found, which makes the response delay shorter and might allow remote attackers to enumerate valid usernames via a series of login requests.

Affected configurations

Vulners
Node
org.springframework.securityspring-security-coreRange3.1.03.1.3
OR
org.springframework.securityspring-security-coreRange3.0.03.0.8
OR
org.springframework.securityspring-security-coreRange<2.0.8
VendorProductVersionCPE
org.springframework.securityspring-security-core*cpe:2.3:a:org.springframework.security:spring-security-core:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

68.3%