You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@geode.apache.org by "Ankush Mittal (Jira)" <ji...@apache.org> on 2022/08/05 12:03:00 UTC

[jira] [Created] (GEODE-10406) Update shiro-core to version 1.9.1 for CVE-2022-32532

Ankush Mittal created GEODE-10406:
-------------------------------------

             Summary: Update shiro-core to version 1.9.1 for CVE-2022-32532 
                 Key: GEODE-10406
                 URL: https://issues.apache.org/jira/browse/GEODE-10406
             Project: Geode
          Issue Type: Bug
    Affects Versions: 1.13.7
            Reporter: Ankush Mittal


As per [https://nvd.nist.gov/vuln/detail/CVE-2022-32532]

"Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass."

Geode bundles version 1.8.0 of shiro-core jar which is vulnerable as per the CVE.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)