Improper Access Control Affecting org.apache.shiro:shiro-web Open this link in a new tab package, versions [,1.3.2)


0.0
high
  • Attack Complexity

    Low

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHESHIRO-30726

  • published

    14 Sep 2016

  • disclosed

    14 Sep 2016

  • credit

    Unknown

Overview

org.apache.shiro:shiro-web Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.

References