You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Ankush Mittal (Jira)" <ji...@apache.org> on 2022/08/05 12:03:00 UTC
[jira] [Created] (GEODE-10406) Update shiro-core to version 1.9.1 for CVE-2022-32532
Ankush Mittal created GEODE-10406:
-------------------------------------
Summary: Update shiro-core to version 1.9.1 for CVE-2022-32532
Key: GEODE-10406
URL: https://issues.apache.org/jira/browse/GEODE-10406
Project: Geode
Issue Type: Bug
Affects Versions: 1.13.7
Reporter: Ankush Mittal
As per [https://nvd.nist.gov/vuln/detail/CVE-2022-32532]
"Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass."
Geode bundles version 1.8.0 of shiro-core jar which is vulnerable as per the CVE.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)