First published: Wed Nov 05 2014(Updated: )
It was discovered that when dealing with undefined security domains, the org.jboss.security.plugins.mapping.JBossMappingManager implementation would fall back to the default security domain if available. A user with valid credentials in the defined default domain, with a role that is valid in the expected application domain, can perform actions that was otherwise not available to them. When using the SAML2 STS Login Module, JBossMappingManager exposes this issue since PicketLink Trust SecurityActions implementation use a hardcoded default value when defining the context.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=6.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7827 has been rated as a moderate severity vulnerability.
To fix CVE-2014-7827, upgrade to JBoss Enterprise Application Platform version 6.3.3 or later.
CVE-2014-7827 may allow unauthorized access due to fallback to the default security domain.
CVE-2014-7827 affects JBoss Enterprise Application Platform versions up to 6.3.2 inclusive.
Any user with valid credentials in the defined default domain may exploit CVE-2014-7827.