When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.
The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching.
Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2023-01-14T09:33:39.775Z
Updated: 2024-08-02T10:13:49.411Z
Reserved: 2023-01-03T23:52:40.911Z
Link: CVE-2023-22602
Vulnrichment
Updated: 2024-07-31T20:15:08.772Z
NVD
Status : Modified
Published: 2023-01-14T10:15:09.140
Modified: 2024-11-21T07:45:02.740
Link: CVE-2023-22602
Redhat