Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
The product uses a hard-coded, unchangeable cryptographic key.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2035.html | third party advisory vendor advisory |
https://lists.apache.org/thread.html/ef3a800c7d727a00e04b78e2f06c5cd8960f09ca28c9b69d94c3c4c4%40%3Cannouncements.aurora.apache.org%3E | mailing list |
http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html | third party advisory vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-2036.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/91024 | broken link third party advisory vdb entry |
http://www.securityfocus.com/archive/1/538570/100/0/threaded | broken link mailing list third party advisory vdb entry |
http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html | third party advisory vdb entry exploit |