Access Restriction Bypass Affecting org.wildfly:wildfly-ejb3 package, versions [8.0.0.Alpha1,8.0.0.CR1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGWILDFLY-31348
  • published24 Feb 2015
  • disclosed6 Dec 2013
  • creditUnknown

Introduced: 6 Dec 2013

CVE-2013-2133  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade org.wildfly:wildfly-ejb3 to version 8.0.0.CR1 or higher.

Overview

org.wildfly:wildfly-ejb3 is a WildFly Application Server

Affected versions of this package are vulnerable to Access Restriction Bypass. The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS handlers by leveraging permissions to the EJB class.

CVSS Scores

version 3.1