Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4437

Опубликовано: 03 июн. 2016
Источник: redhat
CVSS3: 7.3
CVSS2: 6.8
EPSS Критический

Описание

Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.

It was found that Apache Shiro uses a default cipher key for its "remember me" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss A-MQ 6shiro-coreAffected
Red Hat JBoss Fuse 6shiro-coreAffected
Red Hat JBoss Fuse Service Works 6shiro-coreAffected
Red Hat OpenShift Enterprise 2shiro-coreAffected
Red Hat JBoss A-MQ 6.3FixedRHSA-2016:203606.10.2016
Red Hat JBoss Fuse 6.3FixedRHSA-2016:203506.10.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-287

EPSS

Процентиль: 100%
0.94214
Критический

7.3 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.

CVSS3: 9.8
nvd
больше 9 лет назад

Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.

CVSS3: 9.8
debian
больше 9 лет назад

Apache Shiro before 1.2.5, when a cipher key has not been configured f ...

CVSS3: 9.8
github
больше 3 лет назад

Improper Access Control in Apache Shiro

EPSS

Процентиль: 100%
0.94214
Критический

7.3 High

CVSS3

6.8 Medium

CVSS2