GHSA-r679-m633-g7wc

Suggest an improvement
Source
https://github.com/advisories/GHSA-r679-m633-g7wc
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/02/GHSA-r679-m633-g7wc/GHSA-r679-m633-g7wc.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r679-m633-g7wc
Aliases
Published
2020-02-04T22:36:36Z
Modified
2024-12-05T05:38:38.036634Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Improper input validation in Apache Shiro
Details

Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.

Database specific
{
    "nvd_published_at": "2019-11-18T23:15:00Z",
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-02-04T21:49:59Z"
}
References

Affected packages

Maven / org.apache.shiro:shiro-core

Package

Name
org.apache.shiro:shiro-core
View open source insights on deps.dev
Purl
pkg:maven/org.apache.shiro/shiro-core

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.2

Affected versions

1.*

1.0.0-incubating
1.1.0
1.2.0
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.3.0
1.3.1
1.3.2
1.4.0-RC2
1.4.0
1.4.1