Description
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
Remediation
References
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html
https://pivotal.io/security/cve-2019-11272
Related Vulnerabilities
CVE-2018-1002204 Vulnerability in maven package org.webjars:adm-zip
CVE-2022-39231 Vulnerability in npm package parse-server
CVE-2021-29369 Vulnerability in npm package gnuplot
CVE-2020-13956 Vulnerability in maven package org.apache.httpcomponents:httpclient
CVE-2023-40816 Vulnerability in maven package org.opencrx:opencrx-core-models