Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
CPE | Name | Operator | Version |
---|---|---|---|
org.apache.shiro:shiro-root | eq | 1.0.0-incubating |
archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html
exchange.xforce.ibmcloud.com/vulnerabilities/62959
github.com/apache/shiro
nvd.nist.gov/vuln/detail/CVE-2010-3863
web.archive.org/web/20101120091718/www.vupen.com/english/advisories/2010/2888
web.archive.org/web/20101129043410/secunia.com/advisories/41989
web.archive.org/web/20110929165859/www.securityfocus.com/bid/44616
web.archive.org/web/20161017000748/www.securityfocus.com/archive/1/514616/100/0/threaded