Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46750: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Apache Software Foundation Apache Shiro

0
Medium
VulnerabilityCVE-2023-46750cvecve-2023-46750cwe-601
Published: Thu Dec 14 2023 (12/14/2023, 08:15:58 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Shiro

Description

URL Redirection to Untrusted Site ('Open Redirect') vulnerability when "form" authentication is used in Apache Shiro. Mitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.

AI-Powered Analysis

AILast updated: 11/04/2025, 00:44:45 UTC

Technical Analysis

CVE-2023-46750 is classified as a CWE-601 Open Redirect vulnerability found in the Apache Shiro framework, specifically when form-based authentication is enabled. Apache Shiro is a widely used Java security framework that provides authentication, authorization, cryptography, and session management. The vulnerability arises because the framework improperly validates redirect URLs after authentication, allowing an attacker to manipulate the redirect parameter to point to an untrusted external site. This can be exploited by crafting malicious URLs that, when clicked by a user, redirect them to phishing or malicious websites. The vulnerability affects all versions of Apache Shiro prior to 1.13.0 and 2.0.0-alpha-4, including early alpha releases. The CVSS 3.1 base score is 4.7, reflecting a medium severity level due to the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact is primarily on confidentiality, as users may be tricked into divulging credentials or sensitive data on attacker-controlled sites. Integrity and availability are not directly affected. No known exploits have been reported in the wild as of the publication date (December 14, 2023). The recommended mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the redirect validation logic has been corrected to prevent open redirects.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily through social engineering and phishing attacks facilitated by open redirects. Attackers can exploit this flaw to redirect authenticated users to malicious sites that mimic legitimate services, potentially harvesting credentials or delivering malware. This can undermine user trust and lead to data breaches or account compromise. Organizations with customer-facing web applications or internal portals using vulnerable Apache Shiro versions are at risk. The vulnerability does not directly compromise system integrity or availability but can be a stepping stone for more sophisticated attacks. The impact is heightened in sectors with sensitive data such as finance, healthcare, and government services. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection, so exploitation leading to data leakage could result in legal and financial penalties.

Mitigation Recommendations

The primary mitigation is to upgrade Apache Shiro to version 1.13.0 or later, or 2.0.0-alpha-4 or later, where the open redirect vulnerability has been fixed. Organizations should audit their applications to identify usage of vulnerable Shiro versions, especially those employing form-based authentication. Implement strict validation and sanitization of redirect URLs on the server side to ensure they only point to trusted internal domains. Employ Content Security Policy (CSP) headers to reduce the risk of redirection-based attacks. Educate users and administrators about phishing risks associated with open redirects. Monitor web traffic for suspicious redirect patterns and consider deploying web application firewalls (WAFs) with rules targeting open redirect attempts. Finally, integrate this vulnerability into vulnerability management and patching cycles to ensure timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2023-10-25T19:11:12.143Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f67ff0acd01a2492645a4

Added to database: 5/22/2025, 6:07:59 PM

Last enriched: 11/4/2025, 12:44:45 AM

Last updated: 12/3/2025, 3:01:50 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats