First published: Tue Dec 10 2024(Updated: )
It was discovered that Apache Shiro incorrectly handled path traversal when used with other web frameworks or path rewriting. An attacker could possibly use this issue to obtain sensitive information or administrative privileges. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-34478, CVE-2023-46749) It was discovered that Apache Shiro incorrectly handled web redirects when used together with the form authentication method. An attacker could possibly use this issue to perform phishing attacks. This update provides the corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2023-46750) It was discovered that Apache Shiro incorrectly handled requests through servlet filtering. An attacker could possibly use this issue to obtain administrative privileges. This update provides the corresponding fix for Ubuntu 16.04 LTS. (CVE-2016-6802)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libshiro-java | <1.3.2-5ubuntu0.24.10.1 | 1.3.2-5ubuntu0.24.10.1 |
Ubuntu Ubuntu | =24.10 | |
All of | ||
ubuntu/libshiro-java | <1.3.2-5ubuntu0.24.04.1~esm1 | 1.3.2-5ubuntu0.24.04.1~esm1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/libshiro-java | <1.2.4-1ubuntu0.1~esm2 | 1.2.4-1ubuntu0.1~esm2 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)