Description
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
Remediation
References
https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk
http://www.openwall.com/lists/oss-security/2023/07/24/4
https://security.netapp.com/advisory/ntap-20230915-0005/
Related Vulnerabilities
CVE-2019-17359 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on
CVE-2023-30531 Vulnerability in maven package org.jenkins-ci.plugins:consul-kv-builder
CVE-2021-46036 Vulnerability in maven package net.mingsoft:ms-mcms
CVE-2018-8034 Vulnerability in maven package org.apache.tomcat:tomcat-websocket
CVE-2022-43409 Vulnerability in maven package org.jenkins-ci.plugins.workflow:workflow-support