全部节点
技术节点
论坛
漏洞监测
黑客大会
微信公众号
全部节点
时间 | 节点 | |
---|---|---|
2023年11月12日 16:31 | Shiro漏洞监测 |
URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+. |
2023年10月30日 09:01 | Shiro漏洞监测 |
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+. Credit: Apache Shiro would like to thank swifty tk for reporting this issue. |
2023年10月30日 09:01 | Shiro漏洞监测 |
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: Credit: Apache Shiro would like to thank v3ged0ge and Adamytd for reporting this issue. |
2023年10月30日 09:01 | Shiro漏洞监测 |
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher. |
2023年10月30日 09:01 | Shiro漏洞监测 |
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with . in the regular expression are possibly vulnerable to an authorization bypass. |
2021年9月18日 03:57 | Shiro漏洞监测 |
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. |
2021年2月1日 07:13 | Shiro漏洞监测 |
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. If you are NOT using Shiro’s Spring Boot Starter (shiro-spring-boot-web-starter), you must configure add the ShiroRequestMappingConfig autoconfiguration to your application or configure the equivalent manually. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. |
2020年10月30日 17:46 | Shiro漏洞监测 |
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.4.2, when using the default “remember me” configuration, cookies could be susceptible to a padding attack. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path. |
2020年10月7日 19:59 | Shiro漏洞监测 |
Apache Shiro before 1.2.5, when a cipher key has not been configured for the “remember me” feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. |
2020年10月7日 19:58 | Shiro漏洞监测 |
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. |
2020年10月7日 19:58 | Shiro漏洞监测 |
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI. |