First published: Sat Jan 05 2013(Updated: )
The processInvocation function in org.jboss.as.ejb3.security.AuthorizationInterceptor in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) before 6.0.1, authorizes all requests when no roles are allowed for an Enterprise Java Beans (EJB) method invocation, which allows attackers to bypass intended access restrictions for EJB methods.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform | <=6.0.0 | |
Red Hat JBoss Enterprise Application Platform | =4.2.0 | |
Red Hat JBoss Enterprise Application Platform | =4.3.0 | |
Red Hat JBoss Enterprise Application Platform | =5.0.0 | |
Red Hat JBoss Enterprise Application Platform | =5.0.1 | |
Red Hat JBoss Enterprise Application Platform | =5.1.0 | |
Red Hat JBoss Enterprise Application Platform | =5.1.1 | |
Red Hat JBoss Enterprise Application Platform | =5.1.2 | |
Red Hat JBoss Enterprise Application Platform | =5.2.0 | |
Red Hat JBoss Enterprise Application Platform | =5.2.1 | |
Red Hat JBoss Enterprise Application Platform | =5.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4549 is considered a critical vulnerability due to the potential for unauthorized access to EJB methods.
To fix CVE-2012-4549, upgrade your JBoss Enterprise Application Platform to a version that is 6.0.1 or above.
CVE-2012-4549 affects various versions of Red Hat JBoss Enterprise Application Platform, including versions up to 6.0.0 and specific older versions.
CVE-2012-4549 is an authorization bypass vulnerability that affects the processInvocation function in the AuthorizationInterceptor.
Attackers can exploit CVE-2012-4549 by making unauthorized requests to EJB method invocations when no roles are required.