j_spring_security_check bruteforce attempt

Details of BNVL-2019-0036

What does the BNVL label mean?

BitNinja Server Security’s BNVL identifiers are intended for use to identify publicly known information security vulnerabilities in publicly released software packages. This project was designed to collect and analyze attack information from the BitNinja network after cluster analysis by the AI-powered Attack Vector Miner. More than 100 vulnerability types have been discovered with this project so far, so we decided to publish this platform to help to keep Linux server owners up-to-date.

Important! All listed BNVL vulnerabilities are protected by BitNinja PRO, so please check your configurations if your infrastructure is affected by any of them.

Syntax for BNVL labels:

BNVL prefix + Year + Arbitrary Digits

Name : 
j_spring_security_check bruteforce attempt
Related Links: https://stackoverflow.com/questions/16829642/preventing-login-attacks-from-curl-http-post-in-spring-app/16831749#16831749 



Looks like you are using the default request login parameters provided by Spring-Security. The default name attribute and password attribute value is j_username and j_password. So if you change your login page’s username and password parameters name attribute to something specific to you app , then you will be able to avoid such attacks , because in that case only you will be knowing the actual values attribute name and password and no one else and thus no one will be able be able to send request.

Pattern: j_spring_security_check