Added new security-reports page
Project: http://git-wip-us.apache.org/repos/asf/shiro-site/repo Commit: http://git-wip-us.apache.org/repos/asf/shiro-site/commit/e57788cb Tree: http://git-wip-us.apache.org/repos/asf/shiro-site/tree/e57788cb Diff: http://git-wip-us.apache.org/repos/asf/shiro-site/diff/e57788cb Branch: refs/heads/master Commit: e57788cb0b38148f16143a751f650733df99846b Parents: e94a48a Author: Brian Demers <[email protected]> Authored: Mon Oct 31 11:31:52 2016 -0400 Committer: Brian Demers <[email protected]> Committed: Mon Oct 31 11:31:52 2016 -0400 ---------------------------------------------------------------------- security-reports.md | 38 ++++++++++++++++++++++++++++++++++++++ site.xml | 3 +++ templates/default.vtl | 11 +++++++++++ 3 files changed, 52 insertions(+) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/shiro-site/blob/e57788cb/security-reports.md ---------------------------------------------------------------------- diff --git a/security-reports.md b/security-reports.md new file mode 100644 index 0000000..24d4b95 --- /dev/null +++ b/security-reports.md @@ -0,0 +1,38 @@ + +Reporting a vulnerability +------------------------- + +We strongly encourage people to report security vulnerabilities privately to our security list before disclosing them in a public forum. + +Please note that the e-mail address below should only be used for reporting undisclosed security vulnerabilities in Apache Shiro and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. + +[[email protected]](mailto:[email protected]) + + +Vulnerability Handling Process +------------------------------ + +An overview of the vulnerability handling process is: + +* The reporter reports the vulnerability privately to [[email protected]](mailto:[email protected]). +* The Apache Shiro PMC team works privately with the reporter to resolve the vulnerability. +* A new release of the Apache Shiro concerned is made that includes the fix. +* The vulnerability is publicly announced. + +A [more detailed description of the process](http://www.apache.org/security/committers.html) has been written for committers. Reporters of security vulnerabilities may also find it useful. + + +Apache Shiro Vulnerability Reports +---------------------------------- + +###[CVE-2016-6802](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6802) +Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path. + +###[CVE-2016-4437](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437) +Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. + +###[CVE-2014-0074](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0074) +Apache Shiro 1.x before 1.2.3, when using an LDAP server with unauthenticated bind enabled, allows remote attackers to bypass authentication via an empty (1) username or (2) password. + +###[CVE-2010-3863](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3863) +Apache Shiro before 1.1.0, and JSecurity 0.9.x, does not canonicalize URI paths before comparing them to entries in the shiro.ini file, which allows remote attackers to bypass intended access restrictions via a crafted request, as demonstrated by the /./account/index.jsp URI. http://git-wip-us.apache.org/repos/asf/shiro-site/blob/e57788cb/site.xml ---------------------------------------------------------------------- diff --git a/site.xml b/site.xml index 02d41ef..9c8ac1b 100644 --- a/site.xml +++ b/site.xml @@ -187,6 +187,9 @@ <loc>https://shiro.apache.org/reference.html</loc> </url> <url> + <loc>https://shiro.apache.org/security-reports.html</loc> + </url> + <url> <loc>https://shiro.apache.org/securitymanager.html</loc> </url> <url> http://git-wip-us.apache.org/repos/asf/shiro-site/blob/e57788cb/templates/default.vtl ---------------------------------------------------------------------- diff --git a/templates/default.vtl b/templates/default.vtl index 8289494..954bf73 100644 --- a/templates/default.vtl +++ b/templates/default.vtl @@ -160,6 +160,17 @@ </ul> </li> + <li class="dropdown"> + <a href="#" class="dropdown-toggle" data-toggle="dropdown"> + About <b class="caret"></b> + </a> + + <ul class="dropdown-menu"> + <li><a href="$root/about.html">About</a></li> + <li><a href="$root/security-reports.html">Vulnerability Reports</a></li> + </ul> + </li> + </ul> <ul class="nav navbar-nav navbar-right">
