org.apache.shiro:shiro-core@2.0.6 vulnerabilities

  • latest version

    2.1.0

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    26 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.shiro:shiro-core package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Authentication Bypass by Alternate Name

    org.apache.shiro:shiro-core is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Authentication Bypass by Alternate Name while serving static files from a case-insensitive filesystems such as MacOS. An attacker can gain unauthorized access to static files by exploiting differences in filename case handling.

    How to fix Authentication Bypass by Alternate Name?

    Upgrade org.apache.shiro:shiro-core to version 2.1.0 or higher.

    [,2.1.0)
    • L
    Timing Attack

    org.apache.shiro:shiro-core is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Timing Attack in the authentication process. An attacker can infer the existence of valid usernames by measuring response times during authentication attempts.

    How to fix Timing Attack?

    Upgrade org.apache.shiro:shiro-core to version 2.1.0 or higher.

    [,2.1.0)