Description
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
Remediation
References
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html
http://www.securityfocus.com/bid/44616
http://secunia.com/advisories/41989
http://osvdb.org/69067
http://www.vupen.com/english/advisories/2010/2888
https://exchange.xforce.ibmcloud.com/vulnerabilities/62959
http://www.securityfocus.com/archive/1/514616/100/0/threaded
Related Vulnerabilities
CVE-2020-8141 Vulnerability in maven package org.webjars.bowergithub.olado:dot
CVE-2020-7718 Vulnerability in npm package gammautils
CVE-2019-11405 Vulnerability in maven package org.openapitools:openapi-generator-project
CVE-2024-36401 Vulnerability in maven package org.geoserver:gs-wfs
CVE-2023-26473 Vulnerability in maven package org.xwiki.platform:xwiki-platform-query-manager