When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.
The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
References
Link | Resource |
---|---|
https://lists.apache.org/thread/dzj0k2smpzzgj6g666hrbrgsrlf9yhkl | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-01-14 10:15
Updated : 2023-11-07 04:07
NVD link : CVE-2023-22602
Mitre link : CVE-2023-22602
CVE.ORG link : CVE-2023-22602
JSON object : View
Products Affected
vmware
- spring_boot
apache
- shiro
CWE
CWE-436
Interpretation Conflict