#VU92281 Improper Authorization in JBoss Enterprise Application Platform


Published: 2024-06-19

Vulnerability identifier: #VU92281

Vulnerability risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-6236

CWE-ID: CWE-285

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
JBoss Enterprise Application Platform
Server applications / Application servers

Vendor: Red Hat Inc.

Description

The vulnerability allows a remote user to bypass certain security restrictions.

The vulnerability exists in the OidcSessionTokenStore when determining if a cached token should be used or not. When an OIDC app that serves multiple tenants attempts to access the second tenant, it should prompt the user to log in again since the second tenant is secured with a different OIDC configuration. A remote user can gain unauthorized access to the second tenant.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

JBoss Enterprise Application Platform: 8.0 - 8.0.1


External links
http://access.redhat.com/security/cve/CVE-2023-6236
http://bugzilla.redhat.com/show_bug.cgi?id=2250812
http://access.redhat.com/errata/RHSA-2024:3580
http://access.redhat.com/errata/RHSA-2024:3581
http://access.redhat.com/errata/RHSA-2024:3583


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability