Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
The product uses a hard-coded, unchangeable cryptographic key.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2035.html | vendor advisory third party advisory |
https://lists.apache.org/thread.html/ef3a800c7d727a00e04b78e2f06c5cd8960f09ca28c9b69d94c3c4c4%40%3Cannouncements.aurora.apache.org%3E | mailing list |
http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html | third party advisory vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-2036.html | vendor advisory third party advisory |
http://www.securityfocus.com/bid/91024 | vdb entry broken link third party advisory |
http://www.securityfocus.com/archive/1/538570/100/0/threaded | mailing list vdb entry broken link third party advisory |
http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html | exploit vdb entry third party advisory |