Lucene search

K
RedhatKeycloak

18 matches found

CVE
CVE
added 2023/12/18 4:15 p.m.3811 views

CVE-2023-48795

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connecti...

5.9CVSS6.7AI score0.67991EPSS
CVE
CVE
added 2023/08/04 6:15 p.m.250 views

CVE-2023-0264

A flaw was found in Keycloaks OpenID Connect user authentication, which may incorrectly authenticate requests. An authenticated attacker who could obtain information from a user request within the same realm could use that data to impersonate the victim and generate new session tokens. This issue c...

5CVSS4.5AI score0.03396EPSS
CVE
CVE
added 2020/12/15 8:15 p.m.213 views

CVE-2020-10770

A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.

5.3CVSS4.9AI score0.92282EPSS
CVE
CVE
added 2023/03/29 9:15 p.m.192 views

CVE-2022-1274

A flaw was found in Keycloak in the execute-actions-email endpoint. This issue allows arbitrary HTML to be injected into emails sent to Keycloak users and can be misused to perform phishing or other attacks against users.

5.4CVSS5.2AI score0.00785EPSS
CVE
CVE
added 2020/05/15 7:15 p.m.166 views

CVE-2020-1758

A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.

5.9CVSS5.2AI score0.00254EPSS
CVE
CVE
added 2023/12/14 10:15 p.m.160 views

CVE-2023-6134

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomple...

5.4CVSS5.3AI score0.01836EPSS
CVE
CVE
added 2024/02/29 1:43 a.m.129 views

CVE-2024-1722

A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in.

5.3CVSS3.9AI score0.00235EPSS
CVE
CVE
added 2022/08/26 6:15 p.m.124 views

CVE-2022-0225

A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.

5.4CVSS4.9AI score0.00348EPSS
CVE
CVE
added 2019/04/24 4:29 p.m.122 views

CVE-2019-3868

Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user’s browser session.

5.5CVSS3.9AI score0.00291EPSS
CVE
CVE
added 2020/04/06 2:15 p.m.100 views

CVE-2020-1728

A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other p...

5.8CVSS5.2AI score0.00134EPSS
CVE
CVE
added 2022/08/23 4:15 p.m.94 views

CVE-2020-35509

A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.

5.4CVSS5.1AI score0.00105EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.93 views

CVE-2021-3754

A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.

5.3CVSS5.1AI score0.04922EPSS
CVE
CVE
added 2019/06/12 2:29 p.m.92 views

CVE-2019-10157

It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefi...

5.5CVSS5.1AI score0.00019EPSS
CVE
CVE
added 2018/03/12 3:29 p.m.85 views

CVE-2017-2585

Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.

5.9CVSS5.8AI score0.00607EPSS
CVE
CVE
added 2020/05/11 2:15 p.m.76 views

CVE-2020-1698

A flaw was found in keycloak in versions before 9.0.0. A logged exception in the HttpMethod class may leak the password given as parameter. The highest threat from this vulnerability is to data confidentiality.

5.5CVSS5.2AI score0.00051EPSS
CVE
CVE
added 2021/01/28 8:15 p.m.74 views

CVE-2020-1725

A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.

5.5CVSS5.3AI score0.00115EPSS
CVE
CVE
added 2018/08/01 5:29 p.m.70 views

CVE-2018-10894

It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.

5.5CVSS5.8AI score0.00054EPSS
CVE
CVE
added 2018/11/13 7:29 p.m.56 views

CVE-2018-14655

A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.

5.4CVSS5.7AI score0.00234EPSS