Tag Archives: J2EE Misconfiguration: Weak Access Permissions for EJB Methods

CWE-9 – J2EE Misconfiguration: Weak Access Permissions for EJB Methods

Read Time:39 Second

Description

If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit the software system.

If the EJB deployment descriptor contains one or more method permissions that grant access to the special ANYONE role, it indicates that access control for the application has not been fully thought through or that the application is structured in such a way that reasonable access control restrictions are impossible.

Modes of Introduction:

– Architecture and Design

Likelihood of Exploit:

 

Related Weaknesses

CWE-266

 

Consequences

Other: Other

 

Potential Mitigations

Phase: Architecture and Design, System Configuration

Effectiveness:

Description: 

Follow the principle of least privilege when assigning access rights to EJB methods. Permission to invoke EJB methods should not be granted to the ANYONE role.

CVE References