This vulnerability occurs when Enterprise JavaBean (EJB) methods are configured with overly permissive access rights, allowing attackers to exploit elevated privileges they should not have.
A primary indicator of this misconfiguration is the use of the special 'ANYONE' role in the EJB deployment descriptor. Granting this role to methods suggests either incomplete security planning or an application architecture that makes proper access control difficult to implement. This creates a significant risk because it bypasses standard role-based authorization. Attackers can directly invoke sensitive business logic or access data without proper authentication, potentially leading to data breaches, privilege escalation, or unauthorized transactions within the application.
Impact: Other
xml