Page 4 of 17 results (0.017 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 1

Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. Apache Shiro 1.x anterior a 1.2.3, cuando se utiliza un servidor LDAP con bind no autenticado habilitado, permite a atacantes remotos evadir la autenticación a través de (1) un nombre de usuario vació o (2) una contraseña vacía. It was discovered that Apache Shiro authenticated users without specifying a user name or a password when used in conjunction with an LDAP back end that allowed unauthenticated binds. • http://rhn.redhat.com/errata/RHSA-2014-1351.html http://seclists.org/fulldisclosure/2014/Mar/22 https://issues.apache.org/jira/browse/SHIRO-460 https://access.redhat.com/security/cve/CVE-2014-0074 https://bugzilla.redhat.com/show_bug.cgi?id=1072603 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 63%CPEs: 2EXPL: 3

Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI. Apache Shiro anterior a v1.1.0 y JSecurity v0.9.x, no canoniza rutas URI antes de compararlas como entradas en el archivo shiro.ini, lo cual permite a atacantes remotos evitar las restricciones de acceso mediante una solicitud manipulada, como lo demuestra la URI /./account/index.jsp Apache Shiro version 1.0.0-incubating suffers from an information disclosure vulnerability. Shiro's path-based filter chain mechanism did not normalize request paths before performing path-matching logic. • https://www.exploit-db.com/exploits/34952 http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html http://osvdb.org/69067 http://secunia.com/advisories/41989 http://www.securityfocus.com/archive/1/514616/100/0/threaded http://www.securityfocus.com/bid/44616 http://www.vupen.com/english/advisories/2010/2888 https://exchange.xforce.ibmcloud.com/vulnerabilities/62959 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •