Skip to content
May 20, 2025
  • Linkedin
  • Twitter
  • Facebook
  • Youtube

Daily CyberSecurity

Primary Menu
  • Home
  • Cyber Security
  • Cybercriminals
  • Data Leak
  • Linux
  • Malware Attack
  • Open Source Tool
  • Technology
  • Vulnerability
  • Home
  • News
  • Vulnerability
  • CVE-2022-32532: Apache Shiro Authentication Bypass Vulnerability
  • Vulnerability

CVE-2022-32532: Apache Shiro Authentication Bypass Vulnerability

Ddos June 29, 2022 2 min read
CVE-2022-32532

On June 29, 2022, Apache Shiro issued a risk notice about the authentication bypass. The vulnerability number is CVE-2022-32532, the vulnerability level is a high risk. Apache Shiro has an authentication bypass vulnerability due to applications using RegExPatternMatcher with `.` in the regular expression. A remote attacker can send a specially crafted HTTP request to bypass the authentication process and gain unauthorized access to the application.

Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s easy-to-understand API, you can quickly and easily secure any application – from the smallest mobile applications to the largest web and enterprise applications.

“Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass,” read the security bulletin. CVE-2022-32532 flaw was reported by security researcher 4ra1n. Also, the simple poc code is available on Github.

Also, Apache Shiro version 1.9.1 contains 6 fixes since the 1.9.0 release and is available for Download now.

Improvement

* [SHIRO-871] – ActiveDirectoryRealm – append suffix only if missing from username

* [SHIRO-872] – fix Reproducible Builds issues

* [SHIRO-883] – Add support for case insensitive regex path matching

Dependency upgrade

* [SHIRO-878] – Update Spring Dependencies to 5.2.20

* [SHIRO-882] – Upgrade to apache pom parent 26

* [SHIRO-881] – pom.xml in samples/web may lack dependencyfixes

Affected version

  • Apache Shiro < 1.9.1

Unaffected version

  • Apache Shiro 1.9.1

Solution

In this regard, we recommend that users upgrade Apache Shiro to the latest version in time.

Rate this post

Found this helpful?

If this article helped you, please share it with others who might benefit.

Tags: Apache Shiro CVE-2022-32532

Continue Reading

Previous: gallia: comprehensive penetration testing toolchain for cars
Next: Shelltropy: hiding malicious shellcode via Shannon encoding

Search

💙 Support Us!
We need 50 contributors this month to keep this site running.
14 of 50 supporters this month
☕ Buy Me a Coffee PayPalDonate
Our Websites
  • Penetration Testing Tools
  • The Daily Information Technology
    • About SecurityOnline.info
    • Advertise on SecurityOnline.info
    • Contact

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works

    • Disclaimer
    • Privacy Policy
    • DMCA NOTICE
    • Linkedin
    • Twitter
    • Facebook
    • Youtube
    Copyright © All rights reserved.
    x