CVE-2010-3863: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI.
References
- archives.neohapsis.com/archives/fulldisclosure/2010-11/0020.html
- exchange.xforce.ibmcloud.com/vulnerabilities/62959
- github.com/advisories/GHSA-3jx9-mgwx-4q83
- nvd.nist.gov/vuln/detail/CVE-2010-3863
- web.archive.org/web/20101120091718/http://www.vupen.com/english/advisories/2010/2888
- web.archive.org/web/20101129043410/http://secunia.com/advisories/41989
- web.archive.org/web/20110929165859/http://www.securityfocus.com/bid/44616
- web.archive.org/web/20161017000748/http://www.securityfocus.com/archive/1/514616/100/0/threaded
Detect and mitigate CVE-2010-3863 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →