Description
Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null".
Remediation
References
https://pivotal.io/security/cve-2019-11272
https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html
Related Vulnerabilities
CVE-2021-21641 Vulnerability in maven package org.jenkins-ci.plugins:promoted-builds
CVE-2020-2095 Vulnerability in maven package org.jenkins-ci.plugins:redgate-sql-ci
CVE-2022-24846 Vulnerability in maven package org.geowebcache:gwc-diskquota-jdbc
CVE-2022-36904 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector