Get ahead
VMware offers training and certification to turbo-charge your progress.
Learn moreIf an application is using the UserDetails#isEnabled, #isAccountNonExpired, or #isAccountNonLocked user attributes, to enable, expire, or lock users, then DaoAuthenticationProvider's timing attack defense can be bypassed for users who are disabled, expired, or locked.
Spring Security:
Users of affected versions should upgrade to the corresponding fixed version.
| Affected version(s) | Fix version | Availability |
|---|---|---|
| 5.7.x | 5.7.23 | Enterprise Support Only |
| 5.8.x | 5.8.25 | Enterprise Support Only |
| 6.3.x | 6.3.16 | Enterprise Support Only |
| 6.4.x | 6.4.16 | Enterprise Support Only |
| 6.5.x | 6.5.10 | OSS |
| 7.0.x | 7.0.5 | OSS |
Note that this version also introduces a setter DaoAuthenticationProvider#setAlwaysPerformAdditionalChecksOnUser.
In the event that this upgrade causes you trouble, you can set this value to false.
The issue was identified and responsibly reported by meverden.
To report a security vulnerability for a project within the Spring portfolio, see the Security Policy