-
Bug
-
Resolution: Done
-
Blocker
-
None
-
None
Default Elytron configuration assigns role "All" to every user during authentication. If a deployed application uses such the role name for a resource protection, then every authenticated user can access the protected resource. So the security is bypassed then.
The problem is caused by workaround used for mapping "LoginPermission" to all users. It maps role "All" to the users first and then maps "LoginPermission" to this role.
<mappers> <simple-permission-mapper name="login-permission-mapper"> <permission-mapping roles="All"> <permission class-name="org.wildfly.security.auth.permission.LoginPermission"/> </permission-mapping> </simple-permission-mapper> <constant-role-mapper name="constant-roles" roles="All"/> </mappers>
We have to make the default server configuration secure for users.
Suggestions for improvement:
- the LoginPermission mapping should be implicit so everybody has it by default - without specifying it in the server configuration; users should only define cases when they don't want the permission to be assigned to some principals/roles
- constant permission mapper should exist in Elytron subsystem (similar to constant-role-mapper) so the custom permission can be mapped without workarounds through role-mappings
- clones
-
JBEAP-6070 Unsafe Elytron role/permission mapping
- Closed
- is cloned by
-
ELY-641 Unsafe Elytron role/permission mapping
- Resolved
- is incorporated by
-
WFLY-7246 Upgrade to version 1.0.0.Alpha11 of the Elytron Subsystem
- Closed