Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539397/100/0/threaded | |
http://www.securityfocus.com/bid/92947 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539397/100/0/threaded | |
http://www.securityfocus.com/bid/92947 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/539397/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/92947 - Third Party Advisory, VDB Entry |
Information
Published : 2016-09-20 19:59
Updated : 2024-11-21 02:56
NVD link : CVE-2016-6802
Mitre link : CVE-2016-6802
CVE.ORG link : CVE-2016-6802
JSON object : View
Products Affected
apache
- shiro
CWE
CWE-284
Improper Access Control