Philip, I heard back from the Sec team, this IS something that
_should_ be available in the future. Sounds like there is a new CVE
related schema that should help fill in some of the gaps!

- https://cve.mitre.org/community/board/meeting_summaries/21_July_2021.pdf
- 
https://github.com/CVEProject/cve-schema/blob/master/schema/v5.0/CVE_JSON_5.0.schema

Thanks for reaching out!

On Wed, Sep 29, 2021 at 1:40 PM Philip Whitehouse <phi...@whiuk.com> wrote:
>
> If I have to fix the vulnerability scanner that’s a price probably worth 
> paying :)
>
> Best,
>
> Philip Whitehouse
>
> > On 29 Sep 2021, at 16:51, Brian Demers <brian.dem...@gmail.com> wrote:
> >
> > I think so, the ASF has been creating a lot of tooling to help improve
> > CVE reporting process, hopefully the CPE/artifact name can be added to
> > the report. I'll follow up with the ASF Infra team.
> >
> > NOTE: Even if we can add it, some vulns scanners use fuzzy matching,
> > which causes false positives. (mainly because the Maven artifact
> > coordinates are not listed in CVEs)
> >
> >> On Wed, Sep 29, 2021 at 6:02 AM philip <phi...@whiuk.com> wrote:
> >>
> >> Is it practical to look at separating the Spring library from the rest
> >> of Shiro?
> >> It seems like we see a fair number of vulnerabilities for the Spring
> >> code which don't affect other modules / usage.
> >>
> >> Best regards,
> >>
> >> Philip Whitehouse
> >>
> >>> On 2021-09-16 21:19, Brian Demers wrote:
> >>> Description:
> >>>
> >>> Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a
> >>> specially crafted HTTP request may cause an authentication bypass.
> >>>
> >>> Users should update to Apache Shiro 1.8.0.
> >>>
> >>> Credit:
> >>>
> >>> Apache Shiro would like to thank tsug0d for reporting this issue.
>

Reply via email to