Description
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Published: 2010-11-05
Score: 5.0 Medium
EPSS: 13.2% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3jx9-mgwx-4q83 Apache Shiro Path Traversal vulnerability
History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.14021}

epss

{'score': 0.13865}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T03:26:11.892Z

Reserved: 2010-10-08T00:00:00.000Z

Link: CVE-2010-3863

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-11-05T17:00:02.577

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3863

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses