A flaw was found in JBoss EAP, where the authentication configuration is set-up using a legacy SecurityRealm, to delegate to a legacy PicketBox SecurityDomain, and then reloaded to admin-only mode. This flaw allows an attacker to perform a complete authentication bypass by using an arbitrary user and password. The highest threat to vulnerability is to system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1848533 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1848533 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1848533 - Issue Tracking, Vendor Advisory |
Information
Published : 2020-10-16 14:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-14299
Mitre link : CVE-2020-14299
CVE.ORG link : CVE-2020-14299
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- single_sign-on
- openshift_application_runtimes
CWE
CWE-287
Improper Authentication