2.0.2
14 years ago
3 months ago
Known vulnerabilities in the org.apache.shiro:shiro-web package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Path Traversal via the path rewriting feature. An attacker can bypass authentication controls by exploiting the path traversal flaw. How to fix Path Traversal? Upgrade | [,1.13.0)[2.0.0-alpha-1,2.0.0-alpha-4) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') via the How to fix URL Redirection to Untrusted Site ('Open Redirect')? Upgrade | [,1.13.0)[2.0.0-alpha-1,2.0.0-alpha-4) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Directory Traversal when used together with APIs or other web frameworks that route non-normalized requests. An attacker can use this to access unintended locations on the target filesystem by sending malicious requests. How to fix Directory Traversal? Upgrade | [,1.12.0) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Authentication Bypass. when using with Spring, a specially crafted HTTP request may cause an authentication bypass. How to fix Authentication Bypass? Upgrade | [,1.7.1) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Authentication Bypass via a specially crafted HTTP request. How to fix Authentication Bypass? Upgrade | [,1.6.0) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Authentication Bypass. When using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. How to fix Authentication Bypass? Upgrade | [,1.5.3) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Authentication Bypass when using Apache Shiro with Spring dynamic controllers. Then by creating a specially crafted request, it may cause an authentication bypass. How to fix Authentication Bypass? Upgrade | [,1.5.2) |
org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. Affected versions of this package are vulnerable to Directory Traversal. The How to fix Directory Traversal? Upgrade | [,1.5.0) |
| [,1.3.2) |
| [,1.1.0) |