From f53b319825428f6f5f47e8e6616a17bfcbfc2516 Mon Sep 17 00:00:00 2001 From: Brian Demers Date: Tue, 16 Jan 2024 17:43:40 -0500 Subject: [PATCH] Update security report with cve-2023-46749 (#191) * Update security report with cve-2023-46749 * Update security-reports.adoc --- src/site/content/security-reports.adoc | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/site/content/security-reports.adoc b/src/site/content/security-reports.adoc index 71a8cceed..07614b18d 100644 --- a/src/site/content/security-reports.adoc +++ b/src/site/content/security-reports.adoc @@ -29,6 +29,12 @@ A https://www.apache.org/security/committers.html[more detailed description of t == Apache Shiro Vulnerability Reports +=== link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46749[CVE-2023-46749] + +Apache Shiro before 1.13.0 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting + +**Mitigation:** Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default). + === link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46750[CVE-2023-46750] URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro.