TreyM-WSS / concord

Concord - workflow orchestration and continuous deployment management
https://concord.walmartlabs.com
Other
0 stars 1 forks source link

CVE-2023-34478 (Critical) detected in shiro-core-1.5.1.jar #269

Open mend-for-github-com[bot] opened 11 months ago

mend-for-github-com[bot] commented 11 months ago

CVE-2023-34478 - Critical Severity Vulnerability

Vulnerable Library - shiro-core-1.5.1.jar

Apache Shiro is a powerful and flexible open-source security framework that cleanly handles authentication, authorization, enterprise session management, single sign-on and cryptography services.

Library home page: https://shiro.apache.org/shiro-core/

Path to dependency file: /server/plugins/oidc/pom.xml

Path to vulnerable library: /canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar,/canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar,/canner/.m2/repository/org/apache/shiro/shiro-core/1.5.1/shiro-core-1.5.1.jar

Dependency Hierarchy: - :x: **shiro-core-1.5.1.jar** (Vulnerable Library)

Found in HEAD commit: cfb756aae811651de93ac8a69c7191e48bb4960f

Found in base branch: master

Vulnerability Details

Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+

Publish Date: 2023-07-24

URL: CVE-2023-34478

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2023-07-24

Fix Resolution: 1.12.0


:rescue_worker_helmet: Automatic Remediation will be attempted for this issue.