Apache Shiro Interpretation Conflict vulnerability
High severity
GitHub Reviewed
Published
Jan 14, 2023
to the GitHub Advisory Database
•
Updated Aug 31, 2023
Description
Published by the National Vulnerability Database
Jan 14, 2023
Published to the GitHub Advisory Database
Jan 14, 2023
Reviewed
Jan 20, 2023
Last updated
Aug 31, 2023
When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value:
spring.mvc.pathmatch.matching-strategy = ant_path_matcher
References