### [CVE-2016-4437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. ### POC #### Reference - http://packetstormsecurity.com/files/137310/Apache-Shiro-1.2.4-Information-Disclosure.html - http://packetstormsecurity.com/files/157497/Apache-Shiro-1.2.4-Remote-Code-Execution.html #### Github - https://github.com/0day404/vulnerability-poc - https://github.com/0day666/Vulnerability-verification - https://github.com/0x727/FingerprintHub - https://github.com/20142995/Goby - https://github.com/4nth0ny1130/shisoserial - https://github.com/ARPSyndicate/cvemon - https://github.com/ArrestX/--POC - https://github.com/CTF-Archives/Puff-Pastry - https://github.com/Calistamu/graduation-project - https://github.com/HackJava/HackShiro - https://github.com/HackJava/Shiro - https://github.com/HimmelAward/Goby_POC - https://github.com/KRookieSec/WebSecurityStudy - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/MelanyRoob/Goby - https://github.com/Miraitowa70/POC-Notes - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker - https://github.com/SexyBeast233/SecBooks - https://github.com/Shadowven/Vulnerability_Reproduction - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/XuCcc/VulEnv - https://github.com/Z0fhack/Goby_POC - https://github.com/Zero094/Vulnerability-verification - https://github.com/apachecn-archive/Middleware-Vulnerability-detection - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/bigblackhat/oFx - https://github.com/bkfish/Awesome_shiro - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/dota-st/JavaSec - https://github.com/gobysec/Goby - https://github.com/hksanduo/vulworkspace - https://github.com/hktalent/Scan4all_Pro - https://github.com/hktalent/bug-bounty - https://github.com/huimzjty/vulwiki - https://github.com/hxysaury/saury-vulnhub - https://github.com/jas502n/Shiro_Xray - https://github.com/langu-xyz/JavaVulnMap - https://github.com/lnick2023/nicenice - https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection - https://github.com/ltfafei/my_POC - https://github.com/luckyfuture0177/VULOnceMore - https://github.com/m3terpreter/CVE-2016-4437 - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/pizza-power/CVE-2016-4437 - https://github.com/q99266/saury-vulnhub - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/retr0-13/Goby - https://github.com/skyblueflag/WebSecurityStudy - https://github.com/tdtc7/qps - https://github.com/veo/vscan - https://github.com/woods-sega/woodswiki - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xhycccc/Shiro-Vuln-Demo - https://github.com/xk-mt/CVE-2016-4437 - https://github.com/yaklang/vulinone - https://github.com/zhzyker/vulmap