First published: Mon Jun 03 2013(Updated: )
A vulnerability was identified in the way in which method-level authorization for JAX-WS Service endpoints was performed by the EJB invocation handler implementation. Any restrictions declared on EJB methods were ignored when executing the JAX-WS handlers and only class-level restrictions were applied. A remote attacker who is authorized to access the EJB class, could invoke a JAX-WS handler that they are not authorized to.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Jboss Enterprise Application Platform | <=6.1.0 | |
Redhat Jboss Enterprise Application Platform | =4.2.0 | |
Redhat Jboss Enterprise Application Platform | =4.2.0-cp09 | |
Redhat Jboss Enterprise Application Platform | =4.3.0 | |
Redhat Jboss Enterprise Application Platform | =4.3.0-cp10 | |
Redhat Jboss Enterprise Application Platform | =5.0.0 | |
Redhat Jboss Enterprise Application Platform | =5.0.1 | |
Redhat Jboss Enterprise Application Platform | =5.1.0 | |
Redhat Jboss Enterprise Application Platform | =5.1.1 | |
Redhat Jboss Enterprise Application Platform | =5.1.2 | |
Redhat Jboss Enterprise Application Platform | =5.2.0 | |
Redhat Jboss Enterprise Application Platform | =5.2.1 | |
Redhat Jboss Enterprise Application Platform | =5.2.2 | |
Redhat Jboss Enterprise Application Platform | =6.0.0 | |
Redhat Jboss Enterprise Application Platform | =6.0.1 | |
Redhat Enterprise Linux | =5 | |
Redhat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.