Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2016-2035.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2036.html | Third Party Advisory |
http://www.securityfocus.com/archive/1/538570/100/0/threaded | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/91024 | Broken Link Third Party Advisory VDB Entry |
https://lists.apache.org/thread.html/ef3a800c7d727a00e04b78e2f06c5cd8960f09ca28c9b69d94c3c4c4%40%3Cannouncements.aurora.apache.org%3E | Mailing List |
Configurations
History
No history.
Information
Published : 2016-06-07 14:06
Updated : 2024-07-24 17:05
NVD link : CVE-2016-4437
Mitre link : CVE-2016-4437
CVE.ORG link : CVE-2016-4437
JSON object : View
Products Affected
redhat
- fuse
- jboss_middleware_text-only_advisories
apache
- aurora
- shiro
CWE