First published: Mon Oct 06 2014(Updated: )
Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Shiro | =1.0.0 | |
Apache Shiro | =1.1.0 | |
Apache Shiro | =1.2.0 | |
Apache Shiro | =1.2.1 | |
Apache Shiro | =1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.