Bug 1774726 (CVE-2019-12422) - CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default configuration
Summary: CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default config...
Alias: CVE-2019-12422
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1774727
Blocks: 1774728
TreeView+ depends on / blocked
Reported: 2019-11-20 19:39 UTC by Pedro Sampaio
Modified: 2020-12-15 15:56 UTC (History)
30 users (show)

Fixed In Version: shiro 1.4.2
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed: 2019-12-11 01:24:05 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:0983 0 None None None 2020-03-26 15:48:53 UTC

Description Pedro Sampaio 2019-11-20 19:39:18 UTC
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.



Comment 1 Pedro Sampaio 2019-11-20 19:39:37 UTC
Created shiro tracking bugs for this issue:

Affects: fedora-all [bug 1774727]

Comment 2 Kunjan Rathod 2019-11-21 23:36:44 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Fuse Service Works 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 5 Product Security DevOps Team 2019-12-11 01:24:05 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Comment 8 errata-xmlrpc 2020-03-26 15:48:49 UTC
This issue has been addressed in the following products:

  Red Hat Fuse 7.6.0

Via RHSA-2020:0983 https://access.redhat.com/errata/RHSA-2020:0983

Note You need to log in before you can comment on or make changes to this bug.