Vulnerability Name: | CVE-2012-4549 (CCN-80782) | ||||||||||||
Assigned: | 2012-12-18 | ||||||||||||
Published: | 2012-12-18 | ||||||||||||
Updated: | 2013-01-15 | ||||||||||||
Summary: | The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods. | ||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2012-4549 Source: CCN Type: RHSA-2012-1591 Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: Vendor Advisory RHSA-2012:1591 Source: CCN Type: RHSA-2012-1592 Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: Vendor Advisory RHSA-2012:1592 Source: CCN Type: RHSA-2012-1594 Important: JBoss Enterprise Application Platform 6.0.1 update Source: REDHAT Type: Vendor Advisory RHSA-2012:1594 Source: SECUNIA Type: Vendor Advisory 51607 Source: CCN Type: JBoss Web site JBoss Enterprise Application Platform Source: CCN Type: BID-56990 JBoss Enterprise Application Platform CVE-2012-4549 Security Bypass Vulnerability Source: CCN Type: Red Hat Bugzilla Bug 870868 CVE-2012-4549 JBoss AS: EJB authorization succeeds for any role when allowed roles list is empty Source: XF Type: UNKNOWN jbosseap-processinvocation-sec-bypass(80782) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |