Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-0449 Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
Github GHSA Github GHSA GHSA-2ppp-9496-p23q Insufficient Entropy in Spring Security
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: pivotal

Published:

Updated: 2024-09-17T01:01:47.960Z

Reserved: 2020-01-03T00:00:00

Link: CVE-2020-5408

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-05-14T18:15:12.250

Modified: 2024-11-21T05:34:06.490

Link: CVE-2020-5408

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses