Description
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0449 | Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack. |
Github GHSA |
GHSA-2ppp-9496-p23q | Insufficient Entropy in Spring Security |
References
History
No history.
Status: PUBLISHED
Assigner: pivotal
Published:
Updated: 2024-09-17T01:01:47.960Z
Reserved: 2020-01-03T00:00:00.000Z
Link: CVE-2020-5408
No data.
Status : Modified
Published: 2020-05-14T18:15:12.250
Modified: 2024-11-21T05:34:06.490
Link: CVE-2020-5408
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA