First published: Tue Nov 18 2014(Updated: )
It was discovered that the Role Based Access Control (RBAC) implementation did not sufficiently verify all authorization conditions required by the Maintainer role to perform certain administrative actions. An authenticated user with the Maintainer role can use this flaw to add, modify or undefine a limited set of attributes and their values which otherwise cannot be written to.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =6.2.0 | |
JBoss Enterprise Application Platform | =6.2.1 | |
JBoss Enterprise Application Platform | =6.2.2 | |
JBoss Enterprise Application Platform | =6.2.3 | |
JBoss Enterprise Application Platform | =6.2.4 | |
JBoss Enterprise Application Platform | =6.3.0 | |
JBoss Enterprise Application Platform | =6.3.1 | |
JBoss Enterprise Application Platform | =6.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7849 is classified as a medium severity vulnerability due to insufficient verification of authorization conditions.
To mitigate CVE-2014-7849, update the Red Hat JBoss Enterprise Application Platform to a version that includes the necessary patches.
CVE-2014-7849 affects Red Hat JBoss Enterprise Application Platform versions 6.2.0 through 6.3.2.
CVE-2014-7849 is an access control vulnerability that allows unauthorized actions by authenticated users with the Maintainer role.
Authenticated users with the Maintainer role in the affected versions of Red Hat JBoss Enterprise Application Platform are impacted by CVE-2014-7849.