{"id":"CVE-2016-6802","details":"Apache Shiro before 1.3.2 allows attackers to bypass intended servlet filters and gain access by leveraging use of a non-root servlet context path.","aliases":["GHSA-4q2v-j639-cp7p"],"modified":"2026-05-18T10:52:24.965698Z","published":"2016-09-20T19:59:00.137Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/archive/1/539397/100/0/threaded"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/138709/Apache-Shiro-Filter-Bypass.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92947"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/shiro","events":[{"introduced":"0"},{"last_affected":"9055c0bc8a049a30f8afe2f65c1abf0ba9815134"}],"database_specific":{"cpe":"cpe:2.3:a:apache:shiro:1.3.1:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.3.1"}],"source":"CPE_FIELD"}}],"versions":["shiro-root-1.3.1-release-vote1","shiro-root-1.3.1","shiro-root-1.3.0-release-vote1","shiro-root-1.3.0","shiro-root-1.2.6-release-vote1","shiro-root-1.2.6","shiro-root-1.2.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-6802.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}