Description
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Remediation
References
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html
http://osvdb.org/69067
http://secunia.com/advisories/41989
http://www.securityfocus.com/archive/1/514616/100/0/threaded
http://www.securityfocus.com/bid/44616
http://www.vupen.com/english/advisories/2010/2888
https://exchange.xforce.ibmcloud.com/vulnerabilities/62959
Related Vulnerabilities
CVE-2020-11057 Vulnerability in maven package org.xwiki.platform:xwiki-platform-dashboard-macro
CVE-2023-35159 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web-templates
CVE-2020-26256 Vulnerability in maven package org.webjars.npm:fast-csv
CVE-2022-4135 Vulnerability in npm package electron
CVE-2021-46877 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind