We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-0866



Description

This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org.jboss.as.ejb3.security.RunAsPrincipalInterceptor to keep track of the current identity prior to switching to a new identity created using the RunAs principal. The exploit consist that the EJBComponent#incomingRunAsIdentity field is currently just a SecurityIdentity. This means in a concurrent environment, where multiple users are repeatedly invoking an EJB that is configured with a RunAs principal, it's possible for the wrong the caller principal to be returned from EJBComponent#getCallerPrincipal. Similarly, it's also possible for EJBComponent#isCallerInRole to return the wrong value. Both of these methods rely on incomingRunAsIdentity. Affects all versions of JBoss EAP from 7.1.0 and all versions of WildFly 11+ when Elytron is enabled.

Reserved 2022-03-04 | Published 2022-05-10 | Updated 2024-08-02 | Assigner redhat

Problem types

CWE-863

References

bugzilla.redhat.com/show_bug.cgi?id=2060929

cve.org (CVE-2022-0866)

nvd.nist.gov (CVE-2022-0866)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-0866

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.

MonTueWedThuFriSatSun
303112345678910111213141516171819202122232425262728293031123456789
MonTueWedThuFriSatSun
303112345678910111213141516171819202122232425262728293031123456789