Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
No PoCs from references.
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cvemon
- https://github.com/BaiHLiu/RuoYI-4.2-Shiro-721-Docker-PoC
- https://github.com/SugarP1g/LearningSecurity
- https://github.com/being1943/my_rss_reader
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/xhycccc/Shiro-Vuln-Demo