shiro-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Richard Bradley <>
Subject RE: [VOTE] Release Apache Shiro 1.2.5
Date Fri, 13 May 2016 16:41:47 GMT
I think that the fix to still has some remaining
issues. I have commented here:

Further, I think it would be nice if the default cookie mechanisms didn't deserialize user-provided
values at all, to avoid RCE by those who know (or can guess) the encryption key. It would
be better if those who knew the key were limited to being able to fake a login, rather than
being able to own the whole server. That seems less urgent than any fix to 550 though.

Are there any plans to alert Shiro users that this release is very urgent? I don't have the
means or motivation to try to assess the extent of this issue in the wild, but I expect that
many current users of Shiro are open to this serious vulnerability.



-----Original Message-----
From: Brian Demers []
Sent: 12 May 2016 02:13
Subject: [VOTE] Release Apache Shiro 1.2.5

This is a call to vote in favor of releasing Apache Shiro version 1.2.5.
This is a bug fix point release from 1.2.x branch.

The following issues are fixed for 1.2.5:


Staging repo for binaries:

Project website (just for informational purposes, not to be voted upon):

Guide to testing staged releases:

Vote open for 72 hours. Please do examine the source and binaries before voting.

[ ] +1
[ ] +0
[ ] -1 (please include reasoning)
Richard Bradley
Tel : 020 7485 7500 ext 3230 | Fax : 020 7485 7575

Sunday Times Best Small Companies - UK top 25 six years running
Web :<> | Follow us on Twitter : @SoftwireUK<>
Addr : 110 Highgate Studios, 53-79 Highgate Road, London NW5 1TL
Softwire Technology Limited. Registered in England no. 3824658. Registered Office : Gallery
Court, 28 Arcadia Avenue, Finchley, London. N3 2FG
View raw message