Does Apache have a chance to get this entry corrected?
On 2024/01/12 16:21:39 Brian Demers wrote:
Severity: low Affected versions: - Apache Shiro before 1.13.0 - Apache Shiro 2.0.0-alpha-1 before 2.0.0-alpha-4 Description:Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewritingMitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default). References: https://shiro.apache.org/ https://www.cve.org/CVERecord?id=CVE-2023-46749
-- Marcel Stör, https://frightanic.com My PGP key: https://frightanic.com/pgp/ Twitter: https://twitter.com/frightanic
OpenPGP_signature.asc
Description: OpenPGP digital signature
