First published: Fri Nov 05 2010(Updated: )
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.shiro:shiro-root | <1.1.0 | 1.1.0 |
Jsecurity | =0.9.0 | |
Apache Shiro | <=1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3863 is considered critical due to its potential to allow unauthorized access to sensitive resources.
To fix CVE-2010-3863, upgrade Apache Shiro to version 1.1.0 or later, or JSecurity to version 0.9.1 or later.
CVE-2010-3863 affects Apache Shiro versions before 1.1.0 and JSecurity 0.9.x.
CVE-2010-3863 allows remote attackers to bypass access restrictions through crafted URI paths.
There is no known effective workaround for CVE-2010-3863, so upgrading is strongly recommended.