Bug 1774726 (CVE-2019-12422) - CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default configuration
Summary: CVE-2019-12422 shiro: Cookie padding oracle vulnerability with default config...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2019-12422
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1774727
Blocks: 1774728
TreeView+ depends on / blocked
 
Reported: 2019-11-20 19:39 UTC by Pedro Sampaio
Modified: 2019-12-13 20:09 UTC (History)
30 users (show)

Fixed In Version: shiro 1.4.2
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-12-11 01:24:05 UTC


Attachments (Terms of Use)

Description Pedro Sampaio 2019-11-20 19:39:18 UTC
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.

References:

https://lists.apache.org/thread.html/c9db14cfebfb8e74205884ed2bf2e2b30790ce24b7dde9191c82572c@%3Cdev.shiro.apache.org%3E

Comment 1 Pedro Sampaio 2019-11-20 19:39:37 UTC
Created shiro tracking bugs for this issue:

Affects: fedora-all [bug 1774727]

Comment 2 Kunjan Rathod 2019-11-21 23:36:44 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Fuse Service Works 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 5 Product Security DevOps Team 2019-12-11 01:24:05 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-12422


Note You need to log in before you can comment on or make changes to this bug.