It was discovered that Apache Shiro mishandled specially crafted requests. An attacker could use this vulnerability to bypass authentication mechanisms.
{ "binaries": [ { "binary_name": "libshiro-java", "binary_version": "1.3.2-3~18.04.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libshiro-java", "binary_version": "1.3.2-4ubuntu0.1" } ], "availability": "No subscription required" }