[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] [CVE-2019-12422] Apache Shiro weak cookie vulnerability
From:       Brian Demers <bdemers () apache ! org>
Date:       2019-11-18 20:26:43
Message-ID: CAH9eYVoxuzjJRTS9_FBZH2cmkY9Cp2q2rZyUJ-azCsZeqzWj1Q () mail ! gmail ! com
[Download RAW message or body]


The Shiro team is pleased to announce the release of Apache Shiro version
1.4.2.

This security release contains 1 fix since the 1.4.1 release and is
available for Download now [1].

    CVE-2019-12422:
    Apache Shiro before 1.4.2, when using the default "remember me"
configuration,
    cookies could be susceptible to a padding attack.

Release binaries (.jars) are also available through Maven Central and
source bundles through Apache distribution mirrors.

For more information on Shiro, please read the documentation[2].

-The Apache Shiro Team

[1] http://shiro.apache.org/download.html
[2] http://shiro.apache.org/documentation.html


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic