{"id":"USN-7147-1","summary":"shiro vulnerabilities","details":"It was discovered that Apache Shiro incorrectly handled path traversal when\nused with other web frameworks or path rewriting. An attacker could\npossibly use this issue to obtain sensitive information or administrative\nprivileges. This update provides the corresponding fix for Ubuntu 24.04 LTS\nand Ubuntu 24.10. (CVE-2023-34478, CVE-2023-46749)\n\nIt was discovered that Apache Shiro incorrectly handled web redirects when\nused together with the form authentication method. An attacker could\npossibly use this issue to perform phishing attacks. This update provides\nthe corresponding fix for Ubuntu 24.04 LTS and Ubuntu 24.10.\n(CVE-2023-46750)\n\nIt was discovered that Apache Shiro incorrectly handled requests through\nservlet filtering. An attacker could possibly use this issue to obtain\nadministrative privileges. This update provides the corresponding fix for\nUbuntu 16.04 LTS. (CVE-2016-6802)\n","modified":"2026-02-10T04:45:56Z","published":"2024-12-10T18:08:44Z","related":["UBUNTU-CVE-2016-6802","UBUNTU-CVE-2023-34478","UBUNTU-CVE-2023-46749","UBUNTU-CVE-2023-46750"],"upstream":["CVE-2016-6802","CVE-2023-34478","CVE-2023-46749","CVE-2023-46750","UBUNTU-CVE-2016-6802","UBUNTU-CVE-2023-34478","UBUNTU-CVE-2023-46749","UBUNTU-CVE-2023-46750"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7147-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6802"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-34478"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46749"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-46750"}],"affected":[{"package":{"name":"shiro","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/shiro@1.2.4-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.4-1ubuntu0.1~esm2"}]}],"versions":["1.2.4-1","1.2.4-1ubuntu0.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.2.4-1ubuntu0.1~esm2","binary_name":"libshiro-java"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2016-6802"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7147-1.json"}},{"package":{"name":"shiro","ecosystem":"Ubuntu:Pro:24.04:LTS","purl":"pkg:deb/ubuntu/shiro@1.3.2-5ubuntu0.24.04.1~esm1?arch=source&distro=esm-apps/noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.3.2-5ubuntu0.24.04.1~esm1"}]}],"versions":["1.3.2-5"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.2-5ubuntu0.24.04.1~esm1","binary_name":"libshiro-java"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:24.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-34478"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-46749"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-46750"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7147-1.json"}}],"schema_version":"1.7.3"}