You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Alastair (Jira)" <ji...@apache.org> on 2022/08/30 17:10:00 UTC
[jira] [Commented] (GEODE-10406) Update shiro-core to version 1.9.1 for CVE-2022-32532
[ https://issues.apache.org/jira/browse/GEODE-10406?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17597986#comment-17597986 ]
Alastair commented on GEODE-10406:
----------------------------------
This also impacts Geode 1.15.0, which ships with Shiro 1.9.0.
> Update shiro-core to version 1.9.1 for CVE-2022-32532
> ------------------------------------------------------
>
> Key: GEODE-10406
> URL: https://issues.apache.org/jira/browse/GEODE-10406
> Project: Geode
> Issue Type: Bug
> Affects Versions: 1.13.7
> Reporter: Ankush Mittal
> Priority: Major
> Labels: needsTriage
>
> As per [https://nvd.nist.gov/vuln/detail/CVE-2022-32532]
> "Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass."
> Geode bundles version 1.8.0 of shiro-core jar which is vulnerable as per the CVE.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)