Access Restriction Bypass Affecting jbossas4 package, versions *


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.22% (61st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1404-JBOSSAS4-358119
  • published6 Dec 2013
  • disclosed6 Dec 2013

Introduced: 6 Dec 2013

CVE-2013-2133  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:14.04 jbossas4.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jbossas4 package and not the jbossas4 package as distributed by Ubuntu. See How to fix? for Ubuntu:14.04 relevant fixed versions and status.

The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS handlers by leveraging permissions to the EJB class.

CVSS Scores

version 3.1