Lucene search

K
vulnrichmentApacheVULNRICHMENT:CVE-2023-22602
HistoryJan 14, 2023 - 9:33 a.m.

CVE-2023-22602 Apache Shiro before 1.11.0, when used with Spring Boot 2.6+, may allow authentication bypass through a specially crafted HTTP request

2023-01-1409:33:39
CWE-436
apache
github.com
3
cve-2023-22602
apache shiro
authentication bypass
spring boot
http request
update
pattern matching

AI Score

7

Confidence

Low

EPSS

0.004

Percentile

72.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.

The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: spring.mvc.pathmatch.matching-strategy = ant_path_matcher

CNA Affected

[
  {
    "vendor": "Apache Software Foundation",
    "product": "Apache Shiro",
    "versions": [
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "1.11.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

AI Score

7

Confidence

Low

EPSS

0.004

Percentile

72.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial