TreyM-WSS / concord

Concord - workflow orchestration and continuous deployment management
https://concord.walmartlabs.com
Other
0 stars 1 forks source link

CVE-2022-32532 (Critical) detected in shiro-core-1.5.1.jar #205

Open mend-for-github-com[bot] opened 2 years ago

mend-for-github-com[bot] commented 2 years ago

CVE-2022-32532 - Critical Severity Vulnerability

Vulnerable Library - shiro-core-1.5.1.jar

Apache Shiro is a powerful and flexible open-source security framework that cleanly handles authentication, authorization, enterprise session management, single sign-on and cryptography services.

Library home page: https://shiro.apache.org/shiro-core/

Path to dependency file: /server/plugins/oidc/pom.xml

Path to vulnerable library: /canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar,/canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar,/canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar

Dependency Hierarchy: - :x: **shiro-core-1.5.1.jar** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.

Publish Date: 2022-06-29

URL: CVE-2022-32532

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-4cf5-xmhp-3xj7

Release Date: 2022-06-29

Fix Resolution: 1.9.1


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.