Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-23367

Опубликовано: 30 янв. 2025
Источник: redhat
CVSS3: 6.5

Описание

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

Отчет

Red Hat has evaluated this issue and the attacker must be authenticated as a user that belongs to the "Monitor" or "Auditor" management groups. It requires previous privileges to jeopardize an environment.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Build of Keycloakorg.wildfly.core/wildfly-serverNot affected
Red Hat Data Grid 8org.wildfly.core/wildfly-serverWill not fix
Red Hat Fuse 7org.wildfly.core/wildfly-serverOut of support scope
Red Hat JBoss Data Grid 7org.wildfly.core/wildfly-serverOut of support scope
Red Hat JBoss Enterprise Application Platform Expansion Packorg.wildfly.core/wildfly-serverNot affected
Red Hat Process Automation 7org.wildfly.core/wildfly-serverOut of support scope
Red Hat Single Sign-On 7org.wildfly.core/wildfly-serverOut of support scope
Red Hat JBoss Enterprise Application Platform 7org.wildfly.core/wildfly-serverFixedRHSA-2025:346701.04.2025
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8eap7-nettyFixedRHSA-2025:346501.04.2025
Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8eap7-netty-transport-native-epollFixedRHSA-2025:346501.04.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=2337620org.wildfly.core:wildfly-server: Wildfly improper RBAC permission

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
8 месяцев назад

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

CVSS3: 6.5
debian
8 месяцев назад

A flaw was found in the Wildfly Server Role Based Access Control (RBAC ...

CVSS3: 6.5
github
8 месяцев назад

WildFly improper RBAC permission

6.5 Medium

CVSS3