J2EE Misconfiguration: Weak Access Permissions for EJB Methods |
Weakness ID: 9 (Weakness Variant) | Status: Draft |
Description Summary
If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit the software system.
Example 1
The following deployment descriptor grants ANYONE permission to invoke the Employee EJB's method named getSalary().
(Bad Code)
Example Language: XML
<ejb-jar>
...
<assembly-descriptor>
<method-permission>
<role-name>ANYONE</role-name>
<method>
<ejb-name>Employee</ejb-name>
<method-name>getSalary</method-name>
</method-permission>
</assembly-descriptor>
...
</ejb-jar>
Follow the principle of least privilege when assigning access rights to EJB methods. Permission to invoke EJB methods should not be granted to the ANYONE role. |
If the EJB deployment descriptor contains one or more method permissions that grant access to the special ANYONE role, it indicates that access control for the application has not been fully thought through or that the application is structured in such a way that reasonable access control restrictions are impossible. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 2 | Environment | Seven Pernicious Kingdoms (primary)700 |
ChildOf | ![]() | 4 | J2EE Environment Issues | Development Concepts (primary)699 |
ChildOf | ![]() | 266 | Incorrect Privilege Assignment | Research Concepts (primary)1000 |
ChildOf | ![]() | 723 | OWASP Top Ten 2004 Category A2 - Broken Access Control | Weaknesses in OWASP Top Ten (2004) (primary)711 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
7 Pernicious Kingdoms | J2EE Misconfiguration: Weak Access Permissions |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
7 Pernicious Kingdoms | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2009-03-10 | CWE Content Team | MITRE | Internal | |
updated Relationships | ||||
2009-07-27 | CWE Content Team | MITRE | Internal | |
updated Demonstrative Examples | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | J2EE Misconfiguration: Weak Access Permissions | |||