Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
Max CVSS
9.8
EPSS Score
0.07%
Published
2023-07-24
Updated
2023-09-15
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
Max CVSS
7.5
EPSS Score
0.36%
Published
2023-01-14
Updated
2023-08-31
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
Max CVSS
9.8
EPSS Score
1.11%
Published
2022-10-12
Updated
2023-02-02
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
Max CVSS
9.8
EPSS Score
5.49%
Published
2022-06-29
Updated
2022-07-08
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
Max CVSS
9.8
EPSS Score
33.67%
Published
2021-09-17
Updated
2022-08-12
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
Max CVSS
9.8
EPSS Score
36.02%
Published
2021-02-03
Updated
2022-02-22
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
Max CVSS
9.8
EPSS Score
2.29%
Published
2020-11-05
Updated
2022-04-01
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
Max CVSS
7.5
EPSS Score
0.18%
Published
2020-08-17
Updated
2022-03-31
Apache Shiro before 1.5.3, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
Max CVSS
9.8
EPSS Score
0.73%
Published
2020-06-22
Updated
2022-05-03
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
Max CVSS
9.8
EPSS Score
0.66%
Published
2020-03-25
Updated
2022-03-31
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
Max CVSS
7.5
EPSS Score
0.19%
Published
2019-11-18
Updated
2023-02-28
Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.
Max CVSS
7.5
EPSS Score
0.30%
Published
2016-09-20
Updated
2018-10-09

CVE-2016-4437

Known exploited
Public exploit
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
Max CVSS
8.1
EPSS Score
97.48%
Published
2016-06-07
Updated
2018-10-09
CISA KEV Added
2021-11-03
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.
Max CVSS
7.5
EPSS Score
0.64%
Published
2014-10-06
Updated
2014-10-07
14 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!