漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Apache Shiro: Auth bypass when accessing static files only on case-insensitive filesystems
Vulnerability Description
Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. Users are recommended to upgrade to version 2.0.7, which fixes the issue. The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way. Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true Shiro 3.0.0 and later (upcoming) makes this the default.
CVSS Information
N/A
Vulnerability Type
使用候选名称进行的认证绕过
Vulnerability Title
Apache Shiro 安全漏洞
Vulnerability Description
Apache Shiro是美国阿帕奇(Apache)基金会的一套用于执行认证、授权、加密和会话管理的Java安全框架。 Apache Shiro 2.0.7之前版本存在安全漏洞,该漏洞源于备用名称身份验证绕过,可能导致在大小写不敏感的文件系统上绕过过滤器访问静态文件。
CVSS Information
N/A
Vulnerability Type
N/A