Vulnerability Details CVE-2022-0866
This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org.jboss.as.ejb3.security.RunAsPrincipalInterceptor to keep track of the current identity prior to switching to a new identity created using the RunAs principal. The exploit consist that the EJBComponent#incomingRunAsIdentity field is currently just a SecurityIdentity. This means in a concurrent environment, where multiple users are repeatedly invoking an EJB that is configured with a RunAs principal, it's possible for the wrong the caller principal to be returned from EJBComponent#getCallerPrincipal. Similarly, it's also possible for EJBComponent#isCallerInRole to return the wrong value. Both of these methods rely on incomingRunAsIdentity. Affects all versions of JBoss EAP from 7.1.0 and all versions of WildFly 11+ when Elytron is enabled.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 39.4%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 4.3
Products affected by CVE-2022-0866
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.1
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.2
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.3
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.4
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.5
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.6
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.1
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.2
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.4
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.5
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.6
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.9
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4
-
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4.0
-
cpe:2.3:a:redhat:openstack_platform:13.0
-
cpe:2.3:a:redhat:wildfly:11.0.0
-
cpe:2.3:a:redhat:wildfly:12.0.0
-
cpe:2.3:a:redhat:wildfly:13.0.0
-
cpe:2.3:a:redhat:wildfly:14.0.0
-
cpe:2.3:a:redhat:wildfly:14.0.1
-
cpe:2.3:a:redhat:wildfly:15.0.0
-
cpe:2.3:a:redhat:wildfly:15.0.1
-
cpe:2.3:a:redhat:wildfly:16.0.0
-
cpe:2.3:a:redhat:wildfly:17.0.0
-
cpe:2.3:a:redhat:wildfly:17.0.1
-
cpe:2.3:a:redhat:wildfly:18.0.0
-
cpe:2.3:a:redhat:wildfly:18.0.1
-
cpe:2.3:a:redhat:wildfly:19.0.0
-
cpe:2.3:a:redhat:wildfly:19.1.0
-
cpe:2.3:a:redhat:wildfly:20.0.0
-
cpe:2.3:a:redhat:wildfly:20.0.1
-
cpe:2.3:a:redhat:wildfly:21.0.0
-
cpe:2.3:a:redhat:wildfly:21.0.1
-
cpe:2.3:a:redhat:wildfly:21.0.2
-
cpe:2.3:a:redhat:wildfly:22.0.0
-
cpe:2.3:a:redhat:wildfly:22.0.1
-
cpe:2.3:a:redhat:wildfly:23.0.0
-
cpe:2.3:a:redhat:wildfly:23.0.1
-
cpe:2.3:a:redhat:wildfly:23.0.2
-
cpe:2.3:a:redhat:wildfly:24.0.0
-
cpe:2.3:a:redhat:wildfly:24.0.1
-
cpe:2.3:a:redhat:wildfly:25.0.0
-
cpe:2.3:a:redhat:wildfly:25.0.1
-
cpe:2.3:a:redhat:wildfly:26.0.0
-
cpe:2.3:a:redhat:wildfly:26.0.1
-
cpe:2.3:a:redhat:wildfly:26.1.0
-
cpe:2.3:a:redhat:wildfly:26.1.1
-
cpe:2.3:a:redhat:wildfly:26.1.2
-
cpe:2.3:a:redhat:wildfly:27.0.0