Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20220609-0001/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Information
Published : 2021-09-17 02:15
Updated : 2022-08-12 10:49
NVD link : CVE-2021-41303
Mitre link : CVE-2021-41303
JSON object : View
CWE
Products Affected
oracle
- financial_services_crime_and_compliance_management_studio
apache
- shiro