Apache Software Foundation Shiro 1.5.0

CPE Details

Apache Software Foundation Shiro 1.5.0
1.5.0
2020-03-26
15h23 +00:00
2020-03-26
15h23 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:apache:shiro:1.5.0:*:*:*:*:*:*:*

Informations

Vendor

apache

Product

shiro

Version

1.5.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-46749 2024-01-15 09h57 +00:00 Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default).
6.5
Medium
CVE-2023-46750 2023-12-14 08h15 +00:00 URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.
6.1
Medium
CVE-2023-34478 2023-07-24 18h24 +00:00 Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
9.8
Critical
CVE-2023-22602 2023-01-14 09h33 +00:00 When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
7.5
High
CVE-2022-40664 2022-10-11 22h00 +00:00 Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
9.8
Critical
CVE-2022-32532 2022-06-28 21h20 +00:00 Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
9.8
Critical
CVE-2021-41303 2021-09-17 06h20 +00:00 Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
9.8
Critical
CVE-2020-17523 2021-02-03 15h55 +00:00 Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
9.8
Critical
CVE-2020-17510 2020-11-05 19h17 +00:00 Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
9.8
Critical
CVE-2020-13933 2020-08-17 18h19 +00:00 Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
7.5
High
CVE-2020-11989 2020-06-22 16h06 +00:00 Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
9.8
Critical
CVE-2020-1957 2020-03-25 14h24 +00:00 Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
9.8
Critical