Source: shiro
Version: 1.3.2-5
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for shiro.

CVE-2026-23901[0]:
| Observable Timing Discrepancy vulnerability in Apache Shiro.  This
| issue affects Apache Shiro: from 1.*, 2.* before 2.0.7.  Users are
| recommended to upgrade to version 2.0.7 or later, which fixes the
| issue.  Prior to Shiro 2.0.7, code paths for non-existent vs.
| existing users are different enough, that a brute-force attack may
| be able to tell, by timing the requests only, determine if the
| request failed because of a non-existent user vs. wrong password.
| The most likely attack vector is a local attack only. Shiro security
| model  https://shiro.apache.org/security-
| model.html#username_enumeration  discusses this as well.  Typically,
| brute force attack can be mitigated at the infrastructure level.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-23901
    https://www.cve.org/CVERecord?id=CVE-2026-23901
[1] https://www.openwall.com/lists/oss-security/2026/02/08/2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
 Please use
[email protected] for discussions and questions.

Reply via email to