|
|
Message-ID: <9695b630-d6fd-e1f8-0cf8-b3b23aaabbfe@apache.org> Date: Sun, 08 Feb 2026 16:29:35 +0000 From: Lenny Primak <lprimak@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2026-23903: Apache Shiro: Auth bypass when accessing static files only on case-insensitive filesystems Severity: low Affected versions: - Apache Shiro (org.apache.shiro:shiro-web) before 2.0.7 Description: Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. Users are recommended to upgrade to version 2.0.7, which fixes the issue. The issue only effects static files. If static files are served from a case-insensitive filesystem, such as default macOS setup, static files may be accessed by varying the case of the filename in the request. If only lower-case (common default) filters are present in Shiro, they may be bypassed this way. Shiro 2.0.7 and later has a new parameters to remediate this issue shiro.ini: filterChainResolver.caseInsensitive = true application.propertie: shiro.caseInsensitive=true Shiro 3.0.0 and later (upcoming) makes this the default. Credit: Jesse Yang (finder) Lenny Pimak (remediation developer) References: https://shiro.apache.org/ https://www.cve.org/CVERecord?id=CVE-2026-23903
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.