You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Mario Kevo (Jira)" <ji...@apache.org> on 2022/09/15 10:42:00 UTC

[jira] [Assigned] (GEODE-10406) Update shiro-core to version 1.9.1 for CVE-2022-32532

     [ https://issues.apache.org/jira/browse/GEODE-10406?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Mario Kevo reassigned GEODE-10406:
----------------------------------

    Assignee: Mario Kevo

> Update shiro-core to version 1.9.1 for CVE-2022-32532 
> ------------------------------------------------------
>
>                 Key: GEODE-10406
>                 URL: https://issues.apache.org/jira/browse/GEODE-10406
>             Project: Geode
>          Issue Type: Bug
>    Affects Versions: 1.13.7
>            Reporter: Ankush Mittal
>            Assignee: Mario Kevo
>            Priority: Major
>              Labels: needsTriage
>
> As per [https://nvd.nist.gov/vuln/detail/CVE-2022-32532]
> "Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass."
> Geode bundles version 1.8.0 of shiro-core jar which is vulnerable as per the CVE.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)