Description
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.

The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`


Published: 2023-01-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-0383 When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
Github GHSA Github GHSA GHSA-7cxr-h8wm-fg4c Apache Shiro Interpretation Conflict vulnerability
History

No history.

Subscriptions

Apache Shiro
Redhat Camel Spring Boot Jboss Fuse
Vmware Spring Boot
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-02T10:13:49.411Z

Reserved: 2023-01-03T23:52:40.911Z

Link: CVE-2023-22602

cve-icon Vulnrichment

Updated: 2024-07-31T20:15:08.772Z

cve-icon NVD

Status : Modified

Published: 2023-01-14T10:15:09.140

Modified: 2024-11-21T07:45:02.740

Link: CVE-2023-22602

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-13T00:00:00Z

Links: CVE-2023-22602 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses