Files
vulhub/shiro/CVE-2010-3863/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

32 lines
990 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Apache Shiro 认证绕过漏洞CVE-2010-3863
Apache Shiro是一款开源安全框架提供身份验证、授权、密码学和会话管理。Shiro框架直观、易用同时也能提供健壮的安全性。
在Apache Shiro 1.1.0以前的版本中shiro 进行权限验证前未对url 做标准化处理,攻击者可以构造`/``//``/./``/../` 等绕过权限验证
参考链接:
- <https://github.com/apache/shiro/commit/ab8294940a19743583d91f0c7e29b405d197cc34>
- <https://xz.aliyun.com/t/11633#toc-2>
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3863>
## 环境搭建
执行如下命令启动一个搭载Shiro 1.0.0的应用:
```
docker compose up -d
```
环境启动后,访问`http://your-ip:8080`即可查看首页。
## 漏洞复现
直接请求管理页面`/admin`,无法访问,将会被重定向到登录页面:
![](1.png)
构造恶意请求`/./admin`,即可绕过权限校验,访问到管理页面:
![](2.png)