You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Alastair (Jira)" <ji...@apache.org> on 2022/08/30 17:10:00 UTC

[jira] [Commented] (GEODE-10406) Update shiro-core to version 1.9.1 for CVE-2022-32532

    [ https://issues.apache.org/jira/browse/GEODE-10406?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17597986#comment-17597986 ] 

Alastair commented on GEODE-10406:
----------------------------------

This also impacts Geode 1.15.0, which ships with Shiro 1.9.0.

> Update shiro-core to version 1.9.1 for CVE-2022-32532 
> ------------------------------------------------------
>
>                 Key: GEODE-10406
>                 URL: https://issues.apache.org/jira/browse/GEODE-10406
>             Project: Geode
>          Issue Type: Bug
>    Affects Versions: 1.13.7
>            Reporter: Ankush Mittal
>            Priority: Major
>              Labels: needsTriage
>
> As per [https://nvd.nist.gov/vuln/detail/CVE-2022-32532]
> "Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass."
> Geode bundles version 1.8.0 of shiro-core jar which is vulnerable as per the CVE.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)