Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3jx9-mgwx-4q83 | Apache Shiro Path Traversal vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T03:26:11.892Z
Reserved: 2010-10-08T00:00:00
Link: CVE-2010-3863
No data.
Status : Deferred
Published: 2010-11-05T17:00:02.577
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-3863
No data.
OpenCVE Enrichment
No data.
Github GHSA