Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-22602

Опубликовано: 14 янв. 2023
Источник: debian

Описание

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`

Пакеты

ПакетСтатусВерсия исправленияРелизТип
shirounfixedpackage
shirono-dsatrixiepackage
shirono-dsabookwormpackage
shirono-dsabullseyepackage
shiropostponedbusterpackage

Примечания

  • https://lists.apache.org/thread/dzj0k2smpzzgj6g666hrbrgsrlf9yhkl

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`

CVSS3: 7.5
redhat
около 3 лет назад

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`

CVSS3: 7.5
nvd
около 3 лет назад

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`

CVSS3: 7.5
github
около 3 лет назад

Apache Shiro Interpretation Conflict vulnerability

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость фреймворка Apache Shiro и фреймворка создания веб-приложений Spring Boot, связанная с возникновением конфликта интерпретаций, позволяющая нарушителю обойти процедуру аутентификации