Bug 614774 - (CVE-2010-2493) CVE-2010-2493 JBoss SOA Platform web application authentication bypass
CVE-2010-2493 JBoss SOA Platform web application authentication bypass
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On:
  Show dependency treegraph
Reported: 2010-07-15 04:52 EDT by Marc Schoenefeld
Modified: 2015-08-19 04:50 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2010-07-15 08:12:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Marc Schoenefeld 2010-07-15 04:52:28 EDT
The deployment descriptor (web.xml) of picketlink-sts.war in the
security_saml quickstart, the webservice_proxy_security quickstart, and
some of the included web applications (web-console, http-invoker, gpd-deployer, jbpm-console, contract, and uddi-console), contained a configuration that could allow an attacker to bypass the application's security with a crafted HTTP request. To resolve these issues, the following lines have been removed from the web.xml files of the affected quickstarts and applications:


If the security_saml quickstart was used to create another application,
then that new application will need to be reviewed to ensure it does not
have this issue.
Comment 1 Murray McAllister 2010-07-15 08:12:18 EDT

These issues were fixed by the 5.0.2 release of the JBoss Enterprise SOA Platform, available for download from the Red Hat Customer Portal:

The JBoss Enterprise SOA Platform 5.0.2 Release Notes are available from http://www.redhat.com/docs/en-US/JBoss_SOA_Platform/5.0.2/html/5.0.2_Release_Notes/index.html

Note You need to log in before you can comment on or make changes to this bug.