First published: Tue Jun 28 2022(Updated: )
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Shiro | <1.9.1 | |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-32532.
The title of this vulnerability is 'Apache Shiro before 1.9.1 A RegexRequestMatcher can be misconfigured to be bypassed on some servlet …'
The description of this vulnerability is that Apache Shiro before 1.9.1, a RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers, and applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
The severity of CVE-2022-32532 is critical.
The affected software by CVE-2022-32532 is Apache Shiro before version 1.9.1.
To fix CVE-2022-32532, update Apache Shiro to version 1.9.1 or newer.