First published: Tue Jun 07 2016(Updated: )
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Shiro | <=1.2.4 | |
maven/org.apache.shiro:shiro-core | <=1.2.4 | 1.2.5 |
Apache Shiro | ||
debian/shiro | 1.3.2-4+deb11u1 1.3.2-5 | |
Apache Aurora | >=0.10.0<0.18.1 | |
Apache Shiro | <1.2.5 | |
Red Hat Fuse | =1.0 | |
Red Hat JBoss Middleware | =1.0 | |
>=0.10.0<0.18.1 | ||
<1.2.5 | ||
=1.0 | ||
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4437 is classified as critical due to its potential to allow remote code execution.
To fix CVE-2016-4437, upgrade Apache Shiro to version 1.2.5 or later.
CVE-2016-4437 affects Apache Shiro versions prior to 1.2.5.
CVE-2016-4437 can be exploited to execute arbitrary code or bypass access restrictions without a configured cipher key.
CVE-2016-4437 affects the Apache Shiro framework across various platforms that utilize the vulnerable versions.