First published: Wed Nov 05 2014(Updated: )
It was discovered that when dealing with undefined security domains, the org.jboss.security.plugins.mapping.JBossMappingManager implementation would fall back to the default security domain if available. A user with valid credentials in the defined default domain, with a role that is valid in the expected application domain, can perform actions that was otherwise not available to them. When using the SAML2 STS Login Module, JBossMappingManager exposes this issue since PicketLink Trust SecurityActions implementation use a hardcoded default value when defining the context.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Application Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1160574 is classified as moderate.
To fix REDHAT-BUG-1160574, you should update your JBoss Application Server to the latest available version provided by Red Hat.
REDHAT-BUG-1160574 affects the JBoss Application Server when handling undefined security domains.
Yes, REDHAT-BUG-1160574 can potentially allow users with valid credentials in the default domain access to resources they should not have access to.
Currently, there is no official workaround for REDHAT-BUG-1160574 aside from applying the necessary updates.