Lucene search

K
githubGitHub Advisory DatabaseGHSA-RPJ2-W6FR-79HC
HistoryAug 24, 2022 - 12:00 a.m.

Keycloak vulnerable to Improper Certificate Validation

2022-08-2400:00:29
CWE-295
GitHub Advisory Database
github.com
15
keycloak
authentication
vulnerability
certificate validation
data confidentiality
data integrity
software security

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

22.7%

keycloak accepts an expired certificate by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.

This issue was partially fixed in version 13.0.1 and more completely fixed in version 14.0.0.

Affected configurations

Vulners
Node
org.keycloak\keycloakMatchcore
VendorProductVersionCPE
org.keycloak\keycloakcorecpe:2.3:a:org.keycloak\:keycloak:core:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

EPSS

0.001

Percentile

22.7%