CVE-2012-1167
JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to true on the JBossWebRealm, does not properly check the permissions created by the WebPermissionMapping class, which allows remote authenticated users to access arbitrary applications.
El JBoss Server en JBoss Enterprise Application Platform v5.1.x anterior a v5.1.2 y v5.2.x anterior a v5.2.2, Web Platform anterior a v5.1.2, BRMS Platform anterior a v5.3.0, y SOA Platform anterior a v5.3.0, cuando el servidor está configurado para utilizar el JaccAuthorizationRealm y la propiedad ignoreBaseDecision se establece en true en el JBossWebRealm, no comprueba correctamente los permisos creados por la clase WebPermissionMapping, permitiendo a usuarios remotos autenticados acceder a aplicaciones arbitrarias.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-02-14 CVE Reserved
- 2012-06-20 CVE Published
- 2023-06-11 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1027501 | Vdb Entry | |
http://www.securityfocus.com/bid/54089 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/76680 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-1013.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1014.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1026.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1027.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1028.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1125.html | 2017-08-29 | |
http://rhn.redhat.com/errata/RHSA-2012-1232.html | 2017-08-29 | |
http://secunia.com/advisories/49635 | 2017-08-29 | |
http://secunia.com/advisories/49658 | 2017-08-29 | |
http://secunia.com/advisories/50549 | 2017-08-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=802622 | 2012-09-05 | |
https://access.redhat.com/security/cve/CVE-2012-1167 | 2012-09-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 5.1.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.1.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 5.1.1 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.1.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 5.2.0 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | 5.2.1 Search vendor "Redhat" for product "Jboss Enterprise Application Platform" and version "5.2.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Brms Platform Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" | <= 5.2.0 Search vendor "Redhat" for product "Jboss Enterprise Brms Platform" and version " <= 5.2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | <= 5.2.0 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version " <= 5.2.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | 5.0.0 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.0.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | 5.0.1 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.0.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | 5.0.2 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.0.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | 5.1.0 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.1.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Soa Platform Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" | 5.1.1 Search vendor "Redhat" for product "Jboss Enterprise Soa Platform" and version "5.1.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Web Platform Search vendor "Redhat" for product "Jboss Enterprise Web Platform" | <= 5.1.1 Search vendor "Redhat" for product "Jboss Enterprise Web Platform" and version " <= 5.1.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jboss Enterprise Web Platform Search vendor "Redhat" for product "Jboss Enterprise Web Platform" | 5.1.0 Search vendor "Redhat" for product "Jboss Enterprise Web Platform" and version "5.1.0" | - |
Affected
|