CVE-2014-0074
Shiro: successful authentication without specifying user name or password
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.
Apache Shiro 1.x anterior a 1.2.3, cuando se utiliza un servidor LDAP con bind no autenticado habilitado, permite a atacantes remotos evadir la autenticación a través de (1) un nombre de usuario vació o (2) una contraseña vacía.
It was discovered that Apache Shiro authenticated users without specifying a user name or a password when used in conjunction with an LDAP back end that allowed unauthenticated binds.
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat JBoss Fuse 6.1.0 and Red Hat JBoss A-MQ 6.1.0. It includes bug fixes and enhancements, which are documented in the readme.txt file included with the patch files. The following security issues are addressed in this release: It was discovered that Apache Shiro authenticated users without specifying a user name or a password when used in conjunction with an LDAP back end that allowed unauthenticated binds.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-03-04 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2014/Mar/22 | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://issues.apache.org/jira/browse/SHIRO-460 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-1351.html | 2014-10-07 | |
https://access.redhat.com/security/cve/CVE-2014-0074 | 2014-10-09 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1072603 | 2014-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Shiro Search vendor "Apache" for product "Shiro" | 1.0.0 Search vendor "Apache" for product "Shiro" and version "1.0.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Shiro Search vendor "Apache" for product "Shiro" | 1.1.0 Search vendor "Apache" for product "Shiro" and version "1.1.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Shiro Search vendor "Apache" for product "Shiro" | 1.2.0 Search vendor "Apache" for product "Shiro" and version "1.2.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Shiro Search vendor "Apache" for product "Shiro" | 1.2.1 Search vendor "Apache" for product "Shiro" and version "1.2.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Shiro Search vendor "Apache" for product "Shiro" | 1.2.2 Search vendor "Apache" for product "Shiro" and version "1.2.2" | - |
Affected
|