Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-32532 PoC — Authentication Bypass Vulnerability

Source
Associated Vulnerability
Title:Authentication Bypass Vulnerability (CVE-2022-32532)
Description:Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
File Snapshot

[4.0K] /data/pocs/817ae94e083c1d42eaaf09acf41929a9901a80ba ├── [4.0K] META-INF │   └── [ 326] application.xml ├── [1.6K] pom.xml ├── [4.4K] README.MD └── [4.0K] src └── [4.0K] main ├── [4.0K] java │   └── [4.0K] com │   └── [4.0K] example │   └── [4.0K] shiro │   ├── [ 603] DemoController.java │   ├── [1.2K] MyFilter.java │   ├── [1.5K] MyShiroFilterFactoryBean.java │   ├── [2.7K] RegExPatternMatcher191.java │   ├── [ 698] ShiroConfig.java │   └── [ 343] ShiroCve202232532Application.java └── [4.0K] resources ├── [ 150] application.yml └── [ 229] log4j.properties 8 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →