Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0074

Опубликовано: 04 мар. 2014
Источник: redhat
CVSS2: 7.5
EPSS Низкий

Описание

Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.

It was discovered that Apache Shiro authenticated users without specifying a user name or a password when used in conjunction with an LDAP back end that allowed unauthenticated binds.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Web Server 1fuse-6.0Affected
Red Hat JBoss Enterprise Web Server 1fuse-esb-7.1Affected
Red Hat JBoss Fuse Service Works 6shiroWill not fix
Fuse ESB Enterprise 7.1.0FixedRHSA-2014:136909.10.2014
Fuse Management Console 7.1.0FixedRHSA-2014:136909.10.2014
Fuse MQ Enterprise 7.1.0FixedRHSA-2014:136909.10.2014
Red Hat JBoss A-MQ 6.1FixedRHSA-2014:135101.10.2014
Red Hat JBoss Fuse 6.1FixedRHSA-2014:135101.10.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1072603Shiro: successful authentication without specifying user name or password

EPSS

Процентиль: 50%
0.00267
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.

debian
больше 11 лет назад

Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthen ...

github
больше 3 лет назад

Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.

EPSS

Процентиль: 50%
0.00267
Низкий

7.5 High

CVSS2