Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure blockSemicolon is enabled (this is the...
6.5CVSS
6.5AI Score
0.0004EPSS
A vulnerability has been found in Mandelo ssm_shiro_blog 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file updateRoles of the component Backend. The manipulation leads to improper access controls. The exploit has been disclosed to the public.....
7.5CVSS
7.6AI Score
0.001EPSS
URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or...
6.1CVSS
6.3AI Score
0.001EPSS
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or...
9.8CVSS
9.4AI Score
0.001EPSS
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant....
7.5CVSS
7.5AI Score
0.004EPSS
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via...
9.8CVSS
9.2AI Score
0.007EPSS
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with . in the regular expression are possibly vulnerable to an authorization...
9.8CVSS
9.2AI Score
0.04EPSS
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro...
9.8CVSS
9.3AI Score
0.269EPSS
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication...
9.8CVSS
9.4AI Score
0.36EPSS
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication...
9.8CVSS
9.3AI Score
0.023EPSS
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication...
7.5CVSS
7.5AI Score
0.002EPSS
Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication...
9.8CVSS
9.3AI Score
0.016EPSS
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication...
9.8CVSS
9.3AI Score
0.007EPSS
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding...
7.5CVSS
7.3AI Score
0.002EPSS
An issue was discovered in the fileDownload function in the CommonController class in FEBS-Shiro before 2018-11-05. An attacker can download a file via a request of the form /common/download?filename=1.jsp&delete=false. NOTE: the software maintainer disputes the significance of this report because....
7.5CVSS
7.5AI Score
0.003EPSS
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context...
7.5CVSS
7.4AI Score
0.003EPSS
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request...
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2)...
8.8AI Score
0.006EPSS
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp...
6.5AI Score
0.674EPSS