Описание
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | ignored | see notes |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | ignored | see notes |
| esm-apps/focal | ignored | see notes |
| esm-apps/jammy | ignored | see notes |
| esm-apps/noble | ignored | see notes |
| esm-apps/xenial | ignored | see notes |
| esm-infra-legacy/trusty | DNE |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
Apache Shiro before 1.4.2, when using the default "remember me" config ...
Уязвимость фреймворка Apache Shiro, связанная с использованием конфигурации «remember me» по умолчанию, позволяющая нарушителю оказать воздействие на целостность cookie-файлов
EPSS
5 Medium
CVSS2
7.5 High
CVSS3