It was discovered that Apache Shiro mishandled specially crafted requests. An attacker could use this vulnerability to bypass authentication mechanisms.
{ "availability": "No subscription required", "binaries": [ { "libshiro-java": "1.3.2-3~18.04.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "libshiro-java": "1.3.2-4ubuntu0.1" } ] }