CVE Vulnerabilities

CVE-2023-22602

Interpretation Conflict

Published: Jan 14, 2023 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM

When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass.

The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: spring.mvc.pathmatch.matching-strategy = ant_path_matcher

Weakness

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.

Affected Software

Name Vendor Start Version End Version
Shiro Apache * 1.11.0 (excluding)
Red Hat Fuse 7.12 RedHat shiro-core *
RHINT Camel-Springboot 3.20.1 RedHat shiro-core *
Shiro Ubuntu bionic *
Shiro Ubuntu kinetic *
Shiro Ubuntu lunar *
Shiro Ubuntu mantic *
Shiro Ubuntu trusty *
Shiro Ubuntu xenial *

References