spring-security-crypto is vulnerable to Improper Authentication
74
High Risk
Affected versions of this package are vulnerable to improper password verification in BCryptPasswordEncoder.matches(CharSequence, String). When a password exceeds 72 characters, only the first 72 characters are considered for comparison. As a result, passwords that share the same initial 72 characters will incorrectly be treated as identical, potentially allowing authentication bypass.
You are affected if you are using a version that falls within the vulnerable range.
spring-security-crypto is vulnerable to Improper Authentication in versions 0.0.0 - 5.7.15, 5.8.0 - 5.8.17, 6.0.0 - 6.0.15, 6.1.0 - 6.1.13, 6.2.0 - 6.2.9, 6.3.0 - 6.3.7 and 6.4.0 - 6.4.3.
Upgrade the org.springframework.security:spring-security-crypto library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant