Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.
Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
{
"cwe_ids": [
"CWE-22"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/34xxx/CVE-2023-34478.json",
"cna_assigner": "apache",
"unresolved_ranges": [
{
"extracted_events": [
{
"fixed": "1.12.0"
},
{
"fixed": "2.0.0-alpha-3"
}
],
"source": "AFFECTED_FIELD"
},
{
"extracted_events": [
{
"fixed": "1.12.0"
}
],
"source": "DESCRIPTION"
}
]
}