Lucene search

K
githubGitHub Advisory DatabaseGHSA-7CXR-H8WM-FG4C
HistoryJan 14, 2023 - 12:30 p.m.

Apache Shiro Interpretation Conflict vulnerability

2023-01-1412:30:23
CWE-436
GitHub Advisory Database
github.com
8
apache shiro
spring boot
authentication bypass
vulnerability
update
mitigation
http request
pattern matching

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.004 Low

EPSS

Percentile

72.1%

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: spring.mvc.pathmatch.matching-strategy = ant_path_matcher

Affected configurations

Vulners
Node
org.apache.shiro\shiroMatchroot
CPENameOperatorVersion
org.apache.shiro:shiro-rootlt1.11.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.004 Low

EPSS

Percentile

72.1%