From e2190fbec789343d6cef72ecacd48c4de900f613 Mon Sep 17 00:00:00 2001 From: Brian Demers Date: Fri, 12 Jan 2024 11:28:22 -0500 Subject: [PATCH] Update security report with cve-2023-46749 --- src/site/content/security-reports.adoc | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/site/content/security-reports.adoc b/src/site/content/security-reports.adoc index 71a8cceed..78d287088 100644 --- a/src/site/content/security-reports.adoc +++ b/src/site/content/security-reports.adoc @@ -29,6 +29,12 @@ A https://www.apache.org/security/committers.html[more detailed description of t == Apache Shiro Vulnerability Reports +=== link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46749[CVE-2023-46749] + +Apache Shiro before 1.130 or 2.0.0-alpha-4, may be susceptible to a path traversal attack that results in an authentication bypass when used together with path rewriting + +**Mitigation:** Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+, or ensure `blockSemicolon` is enabled (this is the default). + === link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46750[CVE-2023-46750] URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro.