We are looking into getting this corrected.  Thanks for letting us know!

On Fri, Jan 19, 2024 at 4:01 AM Marcel Stör <[email protected]> wrote:
>
> The description in the NVD is not correct. It says "Apache Shiro before
> 1.130" - note the missing dot. Furthermore, it's missing a "Known
> Affected Software Configurations" (listing CPEs) that formally declares
> that 1.13.0 is safe. Without it, no tool can reliably report that my
> project using 1.13.0 is fine.
>
> Does Apache have a chance to get this entry corrected?
>
> On 2024/01/12 16:21:39 Brian Demers wrote:
> > Severity: low
> >
> > Affected versions:
> >
> > - Apache Shiro before 1.13.0
> > - Apache Shiro 2.0.0-alpha-1 before 2.0.0-alpha-4
> >
> > Description:
> >
> > Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path 
> > traversal attack that results in an authentication bypass when used 
> > together with path rewriting
> >
> > Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure 
> > `blockSemicolon` is enabled (this is the default).
> >
> > References:
> >
> > https://shiro.apache.org/
> > https://www.cve.org/CVERecord?id=CVE-2023-46749
> >
> >
> --
> Marcel Stör, https://frightanic.com
> My PGP key: https://frightanic.com/pgp/
> Twitter: https://twitter.com/frightanic

Reply via email to