{"id":"CVE-2023-34478","details":"Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests.\n\nMitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+","aliases":["GHSA-pmhc-2g4f-85cg"],"modified":"2026-04-10T04:58:32.960929Z","published":"2023-07-24T19:15:10.630Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/07/24/4"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230915-0005/"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/mbv26onkgw9o35rldh7vmq11wpv2t2qk"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/shiro","events":[{"introduced":"0"},{"fixed":"c8a294ab32b29a6e9d4b03bbaa6bae11c42daea1"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.12.0"}]}}],"versions":["shiro-root-1.10.0","shiro-root-1.10.0-vote-1","shiro-root-1.11.0","shiro-root-1.4.0-RC2","shiro-root-1.4.0-RC2-release-vote1","shiro-root-1.4.1","shiro-root-1.5.0","shiro-root-1.5.2","shiro-root-1.5.2-release-vote1","shiro-root-1.5.3","shiro-root-1.5.3-release-vote1","shiro-root-1.6.0","shiro-root-1.7.0","shiro-root-1.7.1","shiro-root-1.8.0","shiro-root-1.9.0","shiro-root-1.9.0-release-vote1","shiro-root-1.9.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.0.0-alpha1"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.0-alpha2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-34478.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}