Improper Authentication Affecting shiro package, versions *
Threat Intelligence
EPSS
33.67% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-SHIRO-1586037
- published 17 Sep 2021
- disclosed 17 Sep 2021
Introduced: 17 Sep 2021
CVE-2021-41303 Open this link in a new tabHow to fix?
There is no fixed version for Debian:9 shiro.
NVD Description
Note: Versions mentioned in the description apply only to the upstream shiro package and not the shiro package as distributed by Debian.
See How to fix? for Debian:9 relevant fixed versions and status.
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
References
- https://security-tracker.debian.org/tracker/CVE-2021-41303
- https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E
- https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E
- https://security.netapp.com/advisory/ntap-20220609-0001/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b%40%3Cuser.shiro.apache.org%3E
CVSS Scores
version 3.1