Show filters
24 Total Results
Displaying 1-10 of 24
Sort by:
Attacker Value
Very High
CVE-2016-4437
Disclosure Date: June 07, 2016 (last updated July 25, 2024)
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
3
Attacker Value
Unknown
CVE-2023-46749
Disclosure Date: January 15, 2024 (last updated January 23, 2024)
Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting
Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
0
Attacker Value
Unknown
CVE-2024-0356
Disclosure Date: January 10, 2024 (last updated January 17, 2024)
A vulnerability has been found in Mandelo ssm_shiro_blog 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file updateRoles of the component Backend. The manipulation leads to improper access controls. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250123.
0
Attacker Value
Unknown
CVE-2023-46750
Disclosure Date: December 14, 2023 (last updated December 19, 2023)
URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro.
Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.
0
Attacker Value
Unknown
CVE-2023-34478
Disclosure Date: July 24, 2023 (last updated February 14, 2025)
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
0
Attacker Value
Unknown
CVE-2023-22362
Disclosure Date: February 13, 2023 (last updated October 08, 2023)
SUSHIRO App for Android outputs sensitive information to the log file, which may result in an attacker obtaining a credential information from the log file. Affected products/versions are as follows: SUSHIRO Ver.4.0.31, Thailand SUSHIRO Ver.1.0.0, Hong Kong SUSHIRO Ver.3.0.2, Singapore SUSHIRO Ver.2.0.0, and Taiwan SUSHIRO Ver.2.0.1
0
Attacker Value
Unknown
CVE-2023-22602
Disclosure Date: January 14, 2023 (last updated November 08, 2023)
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.
The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
0
Attacker Value
Unknown
CVE-2022-40664
Disclosure Date: October 12, 2022 (last updated December 22, 2024)
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
0
Attacker Value
Unknown
CVE-2022-32532
Disclosure Date: June 29, 2022 (last updated October 07, 2023)
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
0
Attacker Value
Unknown
CVE-2021-41303
Disclosure Date: September 17, 2021 (last updated November 08, 2023)
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
0