Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0. References: https://www.openwall.com/lists/oss-security/2021/09/17/1 https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E
Marking Red Hat Fuse 7, Red Hat Jboss Fuse 6 and Red Hat AMQ 6 as having a low impact, this is because although vulnerable versions of shiro are distributed only components using shiro in the context of the web application portion of the shiro framework are affected and then only in the context of springboot applications, so the vulnerable functionality is not used for any of these products. This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6 * Red Hat JBoss AMQ 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.