Page 4 of 16 results (0.006 seconds)

CVSS: 5.0EPSS: 63%CPEs: 2EXPL: 3

Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI. Apache Shiro anterior a v1.1.0 y JSecurity v0.9.x, no canoniza rutas URI antes de compararlas como entradas en el archivo shiro.ini, lo cual permite a atacantes remotos evitar las restricciones de acceso mediante una solicitud manipulada, como lo demuestra la URI /./account/index.jsp Apache Shiro version 1.0.0-incubating suffers from an information disclosure vulnerability. Shiro's path-based filter chain mechanism did not normalize request paths before performing path-matching logic. • https://www.exploit-db.com/exploits/34952 http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html http://osvdb.org/69067 http://secunia.com/advisories/41989 http://www.securityfocus.com/archive/1/514616/100/0/threaded http://www.securityfocus.com/bid/44616 http://www.vupen.com/english/advisories/2010/2888 https://exchange.xforce.ibmcloud.com/vulnerabilities/62959 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •