Bug 1343346 (CVE-2016-4437) - CVE-2016-4437 shiro: Security constraint bypass
Summary: CVE-2016-4437 shiro: Security constraint bypass
Keywords:
Status: NEW
Alias: CVE-2016-4437
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1347493 1347492 1347494
Blocks: 1343349 1379523 1381801 1385169
TreeView+ depends on / blocked
 
Reported: 2016-06-07 07:58 UTC by Andrej Nemec
Modified: 2019-09-29 13:50 UTC (History)
18 users (show)

Fixed In Version: shiro 1.2.5
Doc Type: If docs needed, set a value
Doc Text:
It was found that Apache Shiro uses a default cipher key for its "remember me" feature. An attacker could use this to devise a malicious request parameter and gain access to unauthorized content.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:2035 normal SHIPPED_LIVE Important: Red Hat JBoss Fuse 6.3 security update 2016-10-06 20:18:07 UTC
Red Hat Product Errata RHSA-2016:2036 normal SHIPPED_LIVE Important: Red Hat JBoss A-MQ 6.3 security update 2016-10-06 20:18:02 UTC

Description Andrej Nemec 2016-06-07 07:58:31 UTC
A default cipher key is used for the "remember me" feature when not
explicitly configured.  A request that included a specially crafted request
parameter could be used to execute arbitrary code or access content that
would otherwise be protected by a security constraint.

References:

http://seclists.org/oss-sec/2016/q2/466

Comment 2 errata-xmlrpc 2016-10-06 16:18:53 UTC
This issue has been addressed in the following products:

  Red Hat JBoss A-MQ 6.3

Via RHSA-2016:2036 https://rhn.redhat.com/errata/RHSA-2016-2036.html

Comment 3 errata-xmlrpc 2016-10-06 16:20:37 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Fuse 6.3

Via RHSA-2016:2035 https://rhn.redhat.com/errata/RHSA-2016-2035.html


Note You need to log in before you can comment on or make changes to this bug.