When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.

The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`


Advisories
Source ID Title
EUVD EUVD EUVD-2023-0383 When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
Github GHSA Github GHSA GHSA-7cxr-h8wm-fg4c Apache Shiro Interpretation Conflict vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-02T10:13:49.411Z

Reserved: 2023-01-03T23:52:40.911Z

Link: CVE-2023-22602

cve-icon Vulnrichment

Updated: 2024-07-31T20:15:08.772Z

cve-icon NVD

Status : Modified

Published: 2023-01-14T10:15:09.140

Modified: 2024-11-21T07:45:02.740

Link: CVE-2023-22602

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-13T00:00:00Z

Links: CVE-2023-22602 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses