CVE-2016-4437
CRITICAL KEV NUCLEIApache Shiro <1.2.5 - RCE
Title source: llmDescription
Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter.
Exploits (8)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/48410
metasploit
WORKING POC
EXCELLENT
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/shiro_rememberme_v124_deserialize.rb
Nuclei Templates (1)
Apache Shiro 1.2.4 Cookie RememberME - Deserial Remote Code Execution Vulnerability
HIGHby iamnoooob,rootxharsh,pdresearch
References (8)
Scores
CVSS v3
9.8
EPSS
0.9421
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-11-03
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2022-4711
CWE
CWE-321
Status
published
Products (5)
apache/aurora
0.10.0 - 0.18.1
apache/shiro
< 1.2.5
org.apache.shiro/shiro-core
0 - 1.2.5Maven
redhat/fuse
1.0
redhat/jboss_middleware_text-only_advisories
1.0
Published
Jun 07, 2016
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026