First published: Mon Jun 22 2020(Updated: )
A flaw was found in Apache Shiro in versions prior to 1.5.3. When using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/shiro | <1.5.3 | 1.5.3 |
Apache Shiro | <1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11989 is a vulnerability in Apache Shiro where a specially crafted request can cause an authentication bypass when using Apache Shiro with Spring dynamic controllers.
The severity of CVE-2020-11989 is critical with a severity value of 9.
CVE-2020-11989 can lead to data confidentiality and integrity vulnerabilities, as well as system availability issues.
To fix CVE-2020-11989, upgrade to Apache Shiro version 1.5.3 or later.
You can find more information about CVE-2020-11989 at the following references: [CVE-2020-11989](https://www.cve.org/CVERecord?id=CVE-2020-11989), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-11989), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1850069), [Red Hat Errata](https://access.redhat.com/errata/RHSA-2020:5568).