Bug 2006058 (CVE-2021-41303)
Summary: | CVE-2021-41303 shiro: specially crafted HTTP request may cause an authentication bypass | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Nobody <nobody> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, ataylor, chazlett, dbecker, gmalinko, janstey, jjoyce, jochrist, jross, jschluet, jwon, lhh, lpeer, mburns, mkolesni, pdelbell, sclewis, scohen, slinaber |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | shiro 1.8.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in Apache Shiro. When using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. The highest threat from this vulnerability is to data confidentiality, integrity as well as system availability.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 2006059 |
Description
Guilherme de Almeida Suckevicz
2021-09-20 19:08:36 UTC
Marking Red Hat Fuse 7, Red Hat Jboss Fuse 6 and Red Hat AMQ 6 as having a low impact, this is because although vulnerable versions of shiro are distributed only components using shiro in the context of the web application portion of the shiro framework are affected and then only in the context of springboot applications, so the vulnerable functionality is not used for any of these products. This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6 * Red Hat JBoss AMQ 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. |