[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] [CVE-2019-12422] Apache Shiro weak cookie vulnerability
From: Brian Demers <bdemers () apache ! org>
Date: 2019-11-18 20:26:43
Message-ID: CAH9eYVoxuzjJRTS9_FBZH2cmkY9Cp2q2rZyUJ-azCsZeqzWj1Q () mail ! gmail ! com
[Download RAW message or body]
The Shiro team is pleased to announce the release of Apache Shiro version
1.4.2.
This security release contains 1 fix since the 1.4.1 release and is
available for Download now [1].
CVE-2019-12422:
Apache Shiro before 1.4.2, when using the default "remember me"
configuration,
cookies could be susceptible to a padding attack.
Release binaries (.jars) are also available through Maven Central and
source bundles through Apache distribution mirrors.
For more information on Shiro, please read the documentation[2].
-The Apache Shiro Team
[1] http://shiro.apache.org/download.html
[2] http://shiro.apache.org/documentation.html
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic