Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00cTJ2LWo2MzktY3A3cM4AAV9t
Improper Access Control in Apache Shiro
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.
Permalink: https://github.com/advisories/GHSA-4q2v-j639-cp7pJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00cTJ2LWo2MzktY3A3cM4AAV9t
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 8 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-4q2v-j639-cp7p, CVE-2016-6802
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-6802
- https://github.com/apache/shiro/commit/b15ab927709ca18ea4a02538be01919a19ab65af
- https://issues.apache.org/jira/browse/SHIRO-584
- https://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html
- https://github.com/advisories/GHSA-4q2v-j639-cp7p
Affected Packages
maven:org.apache.shiro:shiro-web
Versions: < 1.3.2Fixed in: 1.3.2
maven:org.apache.shiro:shiro-all
Versions: < 1.3.2Fixed in: 1.3.2