GHSA-3jx9-mgwx-4q83

Suggest an improvement
Source
https://github.com/advisories/GHSA-3jx9-mgwx-4q83
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-3jx9-mgwx-4q83/GHSA-3jx9-mgwx-4q83.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3jx9-mgwx-4q83
Aliases
  • CVE-2010-3863
Published
2022-05-14T02:42:51Z
Modified
2024-12-04T05:51:17.893997Z
Summary
Apache Shiro Path Traversal vulnerability
Details

Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.

Database specific
{
    "nvd_published_at": "2010-11-05T17:00:00Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-07T22:57:26Z"
}
References

Affected packages

Maven / org.apache.shiro:shiro-root

Package

Name
org.apache.shiro:shiro-root
View open source insights on deps.dev
Purl
pkg:maven/org.apache.shiro/shiro-root

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0

Affected versions

1.*

1.0.0-incubating