org.apache.shiro:shiro-web@1.5.3 vulnerabilities

  • latest version

    2.0.5

  • latest non vulnerable version

  • first published

    15 years ago

  • latest version published

    19 days ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.shiro:shiro-web package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Path Traversal

    org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Path Traversal via the path rewriting feature. An attacker can bypass authentication controls by exploiting the path traversal flaw.

    How to fix Path Traversal?

    Upgrade org.apache.shiro:shiro-web to version 1.13.0, 2.0.0-alpha-4 or higher.

    [,1.13.0)[2.0.0-alpha-1,2.0.0-alpha-4)
    • M
    URL Redirection to Untrusted Site ('Open Redirect')

    org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to URL Redirection to Untrusted Site ('Open Redirect') via the FORM authentication feature. An attacker can redirect users to an untrusted site by manipulating the URL parameters.

    How to fix URL Redirection to Untrusted Site ('Open Redirect')?

    Upgrade org.apache.shiro:shiro-web to version 1.13.0, 2.0.0-alpha-4 or higher.

    [,1.13.0)[2.0.0-alpha-1,2.0.0-alpha-4)
    • C
    Directory Traversal

    org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Directory Traversal when used together with APIs or other web frameworks that route non-normalized requests. An attacker can use this to access unintended locations on the target filesystem by sending malicious requests.

    How to fix Directory Traversal?

    Upgrade org.apache.shiro:shiro-web to version 1.12.0 or higher.

    [,1.12.0)
    • H
    Authentication Bypass

    org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Authentication Bypass. when using with Spring, a specially crafted HTTP request may cause an authentication bypass.

    How to fix Authentication Bypass?

    Upgrade org.apache.shiro:shiro-web to version 1.7.1 or higher.

    [,1.7.1)
    • H
    Authentication Bypass

    org.apache.shiro:shiro-web is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management.

    Affected versions of this package are vulnerable to Authentication Bypass via a specially crafted HTTP request.

    How to fix Authentication Bypass?

    Upgrade org.apache.shiro:shiro-web to version 1.6.0 or higher.

    [,1.6.0)