Debian Package Tracker
Register | Log in
Subscribe

shiro

Apache Shiro - Java Security Framework

Choose email to subscribe with

general
  • source: shiro (main)
  • version: 1.3.2-6
  • maintainer: Debian Java Maintainers (archive) (DMD)
  • uploaders: Emmanuel Bourg [DMD]
  • arch: all
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.3.2-4+deb10u1
  • oldstable: 1.3.2-4+deb11u1
  • stable: 1.3.2-5
  • testing: 1.3.2-6
  • unstable: 1.3.2-6
versioned links
  • 1.3.2-4+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.3.2-4+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.3.2-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.3.2-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libshiro-java
action needed
A new upstream version is available: 2.0.4 high
A new upstream version 2.0.4 is available, you should consider packaging it.
Created: 2020-06-29 Last update: 2025-06-20 19:35
7 security issues in sid high

There are 7 open security issues in sid.

7 important issues:
  • CVE-2019-12422: Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
  • CVE-2021-41303: Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
  • CVE-2022-32532: Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
  • CVE-2022-40664: Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
  • CVE-2023-22602: When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
  • CVE-2023-34478: Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
  • CVE-2023-46750: URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.
Created: 2022-07-04 Last update: 2025-04-22 17:00
7 low-priority security issues in bookworm low

There are 7 open security issues in bookworm.

7 issues left for the package maintainer to handle:
  • CVE-2019-12422: (needs triaging) Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
  • CVE-2021-41303: (needs triaging) Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
  • CVE-2022-32532: (needs triaging) Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
  • CVE-2022-40664: (needs triaging) Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
  • CVE-2023-22602: (needs triaging) When using Apache Shiro before 1.11.0 together with Spring Boot 2.6+, a specially crafted HTTP request may cause an authentication bypass. The authentication bypass occurs when Shiro and Spring Boot are using different pattern-matching techniques. Both Shiro and Spring Boot < 2.6 default to Ant style pattern matching. Mitigation: Update to Apache Shiro 1.11.0, or set the following Spring Boot configuration value: `spring.mvc.pathmatch.matching-strategy = ant_path_matcher`
  • CVE-2023-34478: (needs triaging) Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs or other web frameworks that route requests based on non-normalized requests. Mitigation: Update to Apache Shiro 1.12.0+ or 2.0.0-alpha-3+
  • CVE-2023-46750: (needs triaging) URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-06-10 Last update: 2025-04-22 17:00
debian/patches: 7 patches to forward upstream low

Among the 9 debian patches available in version 1.3.2-6 of the package, we noticed the following issues:

  • 7 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2024-12-18 08:04
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-02-27 13:24
news
[rss feed]
  • [2024-12-23] shiro 1.3.2-6 MIGRATED to testing (Debian testing watch)
  • [2024-12-17] Accepted shiro 1.3.2-6 (source) into unstable (Emmanuel Bourg)
  • [2021-09-02] Accepted shiro 1.3.2-4+deb10u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Debian FTP Masters) (signed by: Roberto C. Sanchez)
  • [2021-09-02] Accepted shiro 1.3.2-4+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Roberto C. Sanchez)
  • [2021-09-02] shiro 1.3.2-5 MIGRATED to testing (Debian testing watch)
  • [2021-08-27] Accepted shiro 1.3.2-5 (source) into unstable (Roberto C. Sánchez) (signed by: Roberto C. Sanchez)
  • [2021-08-02] Accepted shiro 1.3.2-1+deb9u2 (source) into oldstable (Roberto C. Sánchez) (signed by: Roberto C. Sanchez)
  • [2020-07-08] Accepted shiro 1.3.2-1+deb9u1 (source all) into oldstable (Chris Lamb)
  • [2020-04-19] Accepted shiro 1.2.3-1+deb8u1 (source all) into oldoldstable (Chris Lamb)
  • [2019-03-12] shiro 1.3.2-4 MIGRATED to testing (Debian testing watch)
  • [2019-03-01] Accepted shiro 1.3.2-4 (source) into unstable (Markus Koschany)
  • [2018-12-05] shiro 1.3.2-3 MIGRATED to testing (Debian testing watch)
  • [2018-11-29] Accepted shiro 1.3.2-3 (source) into unstable (Emmanuel Bourg)
  • [2017-08-23] shiro 1.3.2-2 MIGRATED to testing (Debian testing watch)
  • [2017-08-18] Accepted shiro 1.3.2-2 (source all) into unstable (tony mancill)
  • [2016-11-22] shiro 1.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2016-11-16] Accepted shiro 1.3.2-1 (source all) into unstable (Emmanuel Bourg)
  • [2016-08-25] shiro 1.2.5-2 MIGRATED to testing (Debian testing watch)
  • [2016-08-19] Accepted shiro 1.2.5-2 (source all) into unstable (Emmanuel Bourg)
  • [2016-06-15] shiro 1.2.5-1 MIGRATED to testing (Debian testing watch)
  • [2016-06-12] Accepted shiro 1.2.5-1 (source all) into unstable (tony mancill)
  • [2015-07-27] shiro 1.2.4-1 MIGRATED to testing (Britney)
  • [2015-07-21] Accepted shiro 1.2.4-1 (source all) into unstable (Emmanuel Bourg)
  • [2014-11-04] shiro 1.2.3-1 MIGRATED to testing (Britney)
  • [2014-10-24] Accepted shiro 1.2.3-1 (source all) into unstable, unstable (Emmanuel Bourg)
bugs [bug history graph]
  • all: 8
  • RC: 0
  • I&N: 8
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.3.2-6ubuntu1
  • patches for 1.3.2-6ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing