Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html - Exploit | |
References | () http://osvdb.org/69067 - | |
References | () http://secunia.com/advisories/41989 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/514616/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/44616 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/2888 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/62959 - |
Information
Published : 2010-11-05 17:00
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3863
Mitre link : CVE-2010-3863
CVE.ORG link : CVE-2010-3863
JSON object : View
Products Affected
jsecurity
- jsecurity
apache
- shiro
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')