We are looking into getting this corrected. Thanks for letting us know!
On Fri, Jan 19, 2024 at 4:01 AM Marcel Stör <[email protected]> wrote: > > The description in the NVD is not correct. It says "Apache Shiro before > 1.130" - note the missing dot. Furthermore, it's missing a "Known > Affected Software Configurations" (listing CPEs) that formally declares > that 1.13.0 is safe. Without it, no tool can reliably report that my > project using 1.13.0 is fine. > > Does Apache have a chance to get this entry corrected? > > On 2024/01/12 16:21:39 Brian Demers wrote: > > Severity: low > > > > Affected versions: > > > > - Apache Shiro before 1.13.0 > > - Apache Shiro 2.0.0-alpha-1 before 2.0.0-alpha-4 > > > > Description: > > > > Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path > > traversal attack that results in an authentication bypass when used > > together with path rewriting > > > > Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure > > `blockSemicolon` is enabled (this is the default). > > > > References: > > > > https://shiro.apache.org/ > > https://www.cve.org/CVERecord?id=CVE-2023-46749 > > > > > -- > Marcel Stör, https://frightanic.com > My PGP key: https://frightanic.com/pgp/ > Twitter: https://twitter.com/frightanic
