Vulnerability identifier: #VU41392
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
JBoss Enterprise Application Platform
Server applications /
Application servers
Vendor: Red Hat Inc.
Description
The vulnerability allows a remote #AU# to read and manipulate data.
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.
Mitigation
Install update from vendor's website.
Vulnerable software versions
JBoss Enterprise Application Platform: 6.3.0
External links
https://rhn.redhat.com/errata/RHSA-2014-1019.html
https://rhn.redhat.com/errata/RHSA-2014-1020.html
https://rhn.redhat.com/errata/RHSA-2014-1021.html
https://rhn.redhat.com/errata/RHSA-2015-0720.html
https://www.securityfocus.com/bid/69094
https://bugzilla.redhat.com/show_bug.cgi?id=1103815
https://exchange.xforce.ibmcloud.com/vulnerabilities/95170
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.