Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qr6x-62gq-4ccp

Опубликовано: 31 янв. 2025
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

WildFly improper RBAC permission

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

Impact

Standalone server (Domain mode is not affected) with use access control enabled with RBAC provider can be suspended or resumed by unauthorized users. When a server is suspended, the server will stop receiving user requests. The resume handle does the opposite; it will cause a suspended server to start accepting user requests.

Patches

Fixed in WildFly Core 27.0.1.Final

Workarounds

No workaround available

References

See also: https://issues.redhat.com/browse/WFCORE-7153

Acknowledgements

The WildFly project would like to thank Claudia Bartolini (TIM S.p.A), Marco Ventura (TIM S.p.A), and Massimiliano Brolli (TIM S.p.A) for reporting this issue. https://www.gruppotim.it/it/footer/red-team.html

Пакеты

Наименование

org.wildfly.core:wildfly-server

maven
Затронутые версииВерсия исправления

< 27.0.1.Final

27.0.1.Final

Наименование

org.wildfly.core:wildfly-server

maven
Затронутые версииВерсия исправления

= 28.0.0.Beta1

28.0.0.Beta2

EPSS

Процентиль: 23%
0.00072
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 6.5
redhat
8 месяцев назад

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

CVSS3: 6.5
nvd
8 месяцев назад

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

CVSS3: 6.5
debian
8 месяцев назад

A flaw was found in the Wildfly Server Role Based Access Control (RBAC ...

EPSS

Процентиль: 23%
0.00072
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-284