Bug 874349 (CVE-2012-5478)

Summary: CVE-2012-5478 JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
Product: [Other] Security Response Reporter: David Jorm <djorm>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dhorton, mjc, pcheung, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-06-03 00:19:15 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 874369, 874370, 874371    
Bug Blocks: 789173, 835396, 849517, 874358, 883225    

Description David Jorm 2012-11-08 01:16:30 UTC
When the JMX Invoker was configured to restrict access to users with specific roles, the AuthorizationInterceptor threw an exception if an authenticated user not in the specified roles attempted to perform an operation. However, despite throwing an exception, the operation was still performed. A remote attacker with valid JMX Invoker credentials could use this flaw to perform JMX operations accessible to roles they are not a member of.

Comment 1 David Jorm 2012-11-08 01:33:26 UTC
Acknowledgements:

This issue was discovered by Derek Horton of Red Hat.

Comment 4 errata-xmlrpc 2013-01-24 18:09:53 UTC
This issue has been addressed in following products:

  JBoss Enterprise Application Platform 5.2.0

Via RHSA-2013:0194 https://rhn.redhat.com/errata/RHSA-2013-0194.html

Comment 5 errata-xmlrpc 2013-01-24 18:32:45 UTC
This issue has been addressed in following products:

  JBEAP 5 for RHEL 5

Via RHSA-2013:0192 https://rhn.redhat.com/errata/RHSA-2013-0192.html

Comment 6 errata-xmlrpc 2013-01-24 18:33:31 UTC
This issue has been addressed in following products:

  JBEAP 5 for RHEL 6

Via RHSA-2013:0191 https://rhn.redhat.com/errata/RHSA-2013-0191.html

Comment 7 errata-xmlrpc 2013-01-24 18:45:47 UTC
This issue has been addressed in following products:

  JBEWP 5 for RHEL 6

Via RHSA-2013:0195 https://rhn.redhat.com/errata/RHSA-2013-0195.html

Comment 8 errata-xmlrpc 2013-01-24 18:46:32 UTC
This issue has been addressed in following products:

  JBEAP 5 for RHEL 4

Via RHSA-2013:0193 https://rhn.redhat.com/errata/RHSA-2013-0193.html

Comment 9 errata-xmlrpc 2013-01-24 18:58:49 UTC
This issue has been addressed in following products:

  JBEWP 5 for RHEL 4

Via RHSA-2013:0197 https://rhn.redhat.com/errata/RHSA-2013-0197.html

Comment 10 errata-xmlrpc 2013-01-24 18:59:40 UTC
This issue has been addressed in following products:

  JBEWP 5 for RHEL 5

Via RHSA-2013:0196 https://rhn.redhat.com/errata/RHSA-2013-0196.html

Comment 11 errata-xmlrpc 2013-01-24 19:08:41 UTC
This issue has been addressed in following products:

  JBoss Enterprise Web Platform 5.2.0

Via RHSA-2013:0198 https://rhn.redhat.com/errata/RHSA-2013-0198.html

Comment 12 errata-xmlrpc 2013-01-31 20:31:41 UTC
This issue has been addressed in following products:

  JBoss Enterprise BRMS Platform 5.3.1

Via RHSA-2013:0221 https://rhn.redhat.com/errata/RHSA-2013-0221.html

Comment 13 errata-xmlrpc 2013-02-20 21:44:28 UTC
This issue has been addressed in following products:

  JBoss Enterprise SOA Platform 5.3.1

Via RHSA-2013:0533 https://rhn.redhat.com/errata/RHSA-2013-0533.html