Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-46749

Опубликовано: 12 янв. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure blockSemicolon is enabled (this is the default).

A flaw was found in Apache Shiro, which may allow a path traversal attack. When this issue is combined with the path rewriting feature, it can lead to an authentication bypass.

Меры по смягчению последствий

This flaw can be mitigated by making sure 'blockSemicolon' is enabled.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apache Camel for Spring Boot 3shiroOut of support scope
Red Hat build of Apache Camel for Spring Boot 4shiroNot affected
Red Hat build of Quarkusorg.apache.shiro/shiro-coreNot affected
Red Hat Integration Camel K 1shiroNot affected
Red Hat JBoss Enterprise Application Platform 7shiro-coreNot affected
Red Hat JBoss Enterprise Application Platform 8shiro-coreNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packshiro-coreNot affected
Red Hat Fuse 7.13.0shiroFixedRHSA-2024:335423.05.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22->CWE-288
https://bugzilla.redhat.com/show_bug.cgi?id=2258134shiro: path traversal attack may lead to authentication bypass

EPSS

Процентиль: 36%
0.00152
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 2 лет назад

Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).

CVSS3: 6.5
nvd
около 2 лет назад

Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).

CVSS3: 6.5
debian
около 2 лет назад

Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a p ...

CVSS3: 6.5
github
около 2 лет назад

Apache Shiro vulnerable to path traversal

CVSS3: 5.5
fstec
около 2 лет назад

Уязвимость фреймворка Apache Shiro, связанная с недостатками ограничения имени пути к каталогу с ограниченным доступом, позволяющая нарушителю обойти процесс аутентификации

EPSS

Процентиль: 36%
0.00152
Низкий

6.5 Medium

CVSS3