Description
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Remediation
References
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html
http://www.securityfocus.com/bid/44616
http://secunia.com/advisories/41989
http://osvdb.org/69067
http://www.vupen.com/english/advisories/2010/2888
https://exchange.xforce.ibmcloud.com/vulnerabilities/62959
http://www.securityfocus.com/archive/1/514616/100/0/threaded
Related Vulnerabilities
CVE-2022-25921 Vulnerability in npm package morgan-json
CVE-2020-5497 Vulnerability in maven package org.mitre:openid-connect-server-webapp
CVE-2023-34464 Vulnerability in maven package org.xwiki.platform:xwiki-platform-web
CVE-2021-23379 Vulnerability in npm package portkiller
CVE-2023-45807 Vulnerability in maven package org.opensearch.plugin:opensearch-security