Описание
Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure blockSemicolon is enabled (this is the default).
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | released | 1.3.2-5ubuntu1 |
| esm-apps/bionic | ignored | see notes |
| esm-apps/focal | ignored | see notes |
| esm-apps/jammy | ignored | see notes |
| esm-apps/noble | released | 1.3.2-5ubuntu0.24.04.1~esm1 |
| esm-apps/xenial | ignored | see notes |
| focal | ignored | end of standard support, was ignored [see notes] |
| jammy | ignored | see notes |
| lunar | ignored | end of life, was needs-triage |
Показывать по
6.5 Medium
CVSS3
Связанные уязвимости
Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a p ...
Уязвимость фреймворка Apache Shiro, связанная с недостатками ограничения имени пути к каталогу с ограниченным доступом, позволяющая нарушителю обойти процесс аутентификации
6.5 Medium
CVSS3