First published: Thu Nov 01 2012(Updated: )
If multiple applications use the same custom authorization module class name, and provide their own implementations of it, the first application to be loaded will have its implementation used for all applications using the same custom authorization module class name. A local attacker could use this flaw to deploy a malicious application that provides implementations of custom authorization modules that permit or deny user access according to rules supplied by the attacker.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | <=6.0.1 | |
Redhat Jboss Enterprise Application Platform | =4.2.0 | |
Redhat Jboss Enterprise Application Platform | =4.3.0 | |
Redhat Jboss Enterprise Application Platform | =5.0.0 | |
Redhat Jboss Enterprise Application Platform | =5.0.1 | |
Redhat Jboss Enterprise Application Platform | =5.1.0 | |
Redhat Jboss Enterprise Application Platform | =5.1.1 | |
Redhat Jboss Enterprise Application Platform | =5.1.2 | |
Redhat Jboss Enterprise Application Platform | =5.2.0 | |
Redhat Jboss Enterprise Application Platform | =5.2.1 | |
Redhat Jboss Enterprise Application Platform | =5.2.2 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 | |
Redhat Jboss Enterprise Portal Platform | <=6.0.0 | |
Redhat Jboss Enterprise Portal Platform | =4.3.0 | |
Redhat Jboss Enterprise Portal Platform | =5.0.0 | |
Redhat Jboss Enterprise Portal Platform | =5.0.1 | |
Redhat Jboss Enterprise Portal Platform | =5.1.0 | |
Redhat Jboss Enterprise Portal Platform | =5.1.1 | |
Redhat Jboss Enterprise Portal Platform | =5.2.0 | |
Redhat Jboss Enterprise Portal Platform | =5.2.1 | |
Redhat Jboss Enterprise Portal Platform | =5.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.