Interpretation Conflict Affecting shiro package, versions *


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.37% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-SHIRO-3231718
  • published17 Jan 2023
  • disclosed14 Jan 2023

Introduced: 14 Jan 2023

CVE-2023-22602  (opens in a new tab)
CWE-436  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable shiro.

NVD Description

Note: Versions mentioned in the description apply only to the upstream shiro package and not the shiro package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.

The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: spring.mvc.pathmatch.matching-strategy = ant_path_matcher

CVSS Scores

version 3.1