Lucene search

K

35 matches found

CVE
CVE
added 2022/08/23 4:15 p.m.2302 views

CVE-2021-3827

A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The high...

6.8CVSS6.7AI score0.00128EPSS
CVE
CVE
added 2020/12/15 8:15 p.m.224 views

CVE-2020-10770

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

5.3CVSS4.9AI score0.92282EPSS
In wildWeb
CVE
CVE
added 2022/07/08 12:15 a.m.208 views

CVE-2022-1245

A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to a...

9.8CVSS9.4AI score0.00396EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.165 views

CVE-2021-4133

A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.

8.8CVSS8.3AI score0.00134EPSS
CVE
CVE
added 2021/05/28 11:15 a.m.160 views

CVE-2020-27826

A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.

4.9CVSS3.9AI score0.00166EPSS
CVE
CVE
added 2020/11/17 2:15 a.m.144 views

CVE-2020-14389

It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.

8.1CVSS7.7AI score0.00148EPSS
CVE
CVE
added 2020/11/17 2:15 a.m.128 views

CVE-2020-10776

A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.

4.8CVSS4.6AI score0.00271EPSS
CVE
CVE
added 2022/08/22 3:15 p.m.125 views

CVE-2021-3513

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

7.5CVSS7.1AI score0.00277EPSS
CVE
CVE
added 2020/01/08 3:15 p.m.124 views

CVE-2019-14820

It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.

4.3CVSS4.4AI score0.0031EPSS
CVE
CVE
added 2020/09/16 6:15 p.m.118 views

CVE-2020-10748

A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.

6.1CVSS5.3AI score0.00391EPSS
CVE
CVE
added 2022/09/01 9:15 p.m.116 views

CVE-2022-2256

A Stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7. This flaw allows a privileged attacker to execute malicious scripts in the admin console, abusing the default roles functionality.

3.8CVSS4AI score0.00308EPSS
CVE
CVE
added 2021/05/28 11:15 a.m.115 views

CVE-2021-20195

A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is...

9.6CVSS8.7AI score0.00305EPSS
CVE
CVE
added 2022/08/05 5:15 p.m.113 views

CVE-2022-2668

An issue was discovered in Keycloak that allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the UPLOAD_SCRIPTS feature is disabled

7.2CVSS6.7AI score0.00273EPSS
CVE
CVE
added 2021/02/11 6:15 p.m.110 views

CVE-2020-1717

A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.

4CVSS3.6AI score0.00183EPSS
CVE
CVE
added 2020/09/16 4:15 p.m.107 views

CVE-2020-10758

A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.

7.5CVSS7.2AI score0.00529EPSS
CVE
CVE
added 2021/06/01 7:15 p.m.106 views

CVE-2021-3424

A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 where IDN homograph attacks are possible. A malicious user can register himself with a name already registered and trick admin to grant him extra privileges.

5.3CVSS5.2AI score0.00164EPSS
CVE
CVE
added 2022/08/23 4:15 p.m.102 views

CVE-2020-35509

A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.

5.4CVSS5.1AI score0.00183EPSS
CVE
CVE
added 2021/05/12 3:15 p.m.102 views

CVE-2021-20202

A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to...

7.3CVSS6.9AI score0.00046EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.99 views

CVE-2021-3632

A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.

7.5CVSS7.2AI score0.00135EPSS
CVE
CVE
added 2020/09/16 7:15 p.m.98 views

CVE-2020-1694

A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.

4.9CVSS4.6AI score0.00275EPSS
CVE
CVE
added 2021/03/23 5:15 p.m.95 views

CVE-2021-20222

A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

7.5CVSS7.3AI score0.00511EPSS
CVE
CVE
added 2021/03/09 6:15 p.m.92 views

CVE-2021-20262

A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity...

6.8CVSS6.2AI score0.00044EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.91 views

CVE-2021-3461

A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].

7.1CVSS6.6AI score0.00052EPSS
CVE
CVE
added 2018/02/21 6:29 p.m.84 views

CVE-2017-12161

It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further atta...

8.8CVSS8.3AI score0.00294EPSS
CVE
CVE
added 2020/12/15 8:15 p.m.83 views

CVE-2020-14302

A flaw was found in Keycloak before 13.0.0 where an external identity provider, after successful authentication, redirects to a Keycloak endpoint that accepts multiple invocations with the use of the same "state" parameter. This flaw allows a malicious user to perform replay attacks.

4.9CVSS5AI score0.00154EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.80 views

CVE-2021-3856

ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.

4.3CVSS4.5AI score0.0016EPSS
CVE
CVE
added 2021/02/11 6:15 p.m.78 views

CVE-2020-10734

A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.

3.3CVSS3.9AI score0.0002EPSS
CVE
CVE
added 2021/03/08 10:15 p.m.77 views

CVE-2020-27838

A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulne...

6.5CVSS6.4AI score0.89101EPSS
CVE
CVE
added 2021/02/23 1:15 p.m.75 views

CVE-2020-14359

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a J...

7.5CVSS7.1AI score0.00259EPSS
CVE
CVE
added 2017/10/26 5:29 p.m.74 views

CVE-2017-12158

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

5.4CVSS5.1AI score0.00668EPSS
CVE
CVE
added 2021/01/28 8:15 p.m.74 views

CVE-2020-1725

A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.

5.5CVSS5.3AI score0.00115EPSS
CVE
CVE
added 2017/12/29 3:29 p.m.73 views

CVE-2014-3651

JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.

7.5CVSS7.4AI score0.00802EPSS
Web
CVE
CVE
added 2017/10/26 5:29 p.m.73 views

CVE-2017-12159

It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks.

7.5CVSS6.9AI score0.01452EPSS
CVE
CVE
added 2020/05/04 9:15 p.m.57 views

CVE-2020-10686

A flaw was found in Keycloak version 8.0.2 and 9.0.0, and was fixed in Keycloak version 9.0.1, where a malicious user registers as oneself. The attacker could then use the remove devices form to post different credential IDs and possibly remove MFA devices for other users.

6.5CVSS4.6AI score0.00238EPSS
CVE
CVE
added 2017/10/18 2:29 p.m.52 views

CVE-2014-3709

The org.keycloak.services.resources.SocialResource.callback method in JBoss KeyCloak before 1.0.3.Final allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging lack of CSRF protection.

8.8CVSS8.7AI score0.00274EPSS