A flaw was found in the JBoss EAP, where the authentication configuration is set up using a legacy SecurityRealm to delegate to a legacy PicketBox SecurityDomain and then reloaded to admin-only mode. This flaw allows a complete authentication bypass by using arbitrary user and password. This is only applicable when going from a running server to admin-only mode.
Acknowledgments: Name: Darran Lofthouse (Red Hat)
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 6 Via RHSA-2020:4244 https://access.redhat.com/errata/RHSA-2020:4244
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 8 Via RHSA-2020:4245 https://access.redhat.com/errata/RHSA-2020:4245
This issue has been addressed in the following products: Red Hat JBoss Enterprise Application Platform 7.3 for RHEL 7 Via RHSA-2020:4246 https://access.redhat.com/errata/RHSA-2020:4246
This issue has been addressed in the following products: EAP 7.3.3 Via RHSA-2020:4247 https://access.redhat.com/errata/RHSA-2020:4247
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-14299
This issue has been addressed in the following products: Red Hat Single Sign-On 7.4.3 Via RHSA-2020:4931 https://access.redhat.com/errata/RHSA-2020:4931
This issue has been addressed in the following products: Red Hat Openshift Application Runtimes Via RHSA-2020:5361 https://access.redhat.com/errata/RHSA-2020:5361