Lucene search

K
RedhatKeycloak

19 matches found

CVE
CVE
added 2024/01/26 3:15 p.m.247 views

CVE-2023-6291

A flaw was found in the redirect_uri validation logic in Keycloak. This issue may allow a bypass of otherwise explicitly allowed hosts. A successful attack may lead to an access token being stolen, making it possible for the attacker to impersonate other users.

7.1CVSS6.5AI score0.00196EPSS
CVE
CVE
added 2024/09/09 7:15 p.m.243 views

CVE-2024-7341

A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication...

7.1CVSS6.9AI score0.01149EPSS
CVE
CVE
added 2024/09/10 5:15 p.m.206 views

CVE-2023-6841

A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values.

7.5CVSS7.3AI score0.00269EPSS
CVE
CVE
added 2023/12/14 6:15 p.m.165 views

CVE-2023-6563

An unconstrained memory consumption vulnerability was discovered in Keycloak. It can be triggered in environments which have millions of offline tokens (> 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the "consents" tab ...

7.7CVSS7.3AI score0.00304EPSS
CVE
CVE
added 2023/10/04 11:15 a.m.138 views

CVE-2023-2422

A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to oth...

7.1CVSS6.5AI score0.00217EPSS
CVE
CVE
added 2020/05/08 2:15 p.m.125 views

CVE-2019-10170

A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permis...

7.2CVSS6.9AI score0.00742EPSS
CVE
CVE
added 2022/08/22 3:15 p.m.118 views

CVE-2021-3513

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

7.5CVSS7.1AI score0.00174EPSS
CVE
CVE
added 2021/07/09 11:15 a.m.116 views

CVE-2021-3637

A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.

7.5CVSS7.1AI score0.00409EPSS
CVE
CVE
added 2020/05/08 2:15 p.m.112 views

CVE-2019-10169

A flaw was found in Keycloak’s user-managed access interface, where it would permit a script to be set in the UMA policy. This flaw allows an authenticated attacker with UMA permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the user running ap...

7.2CVSS7AI score0.00608EPSS
CVE
CVE
added 2022/08/05 5:15 p.m.106 views

CVE-2022-2668

An issue was discovered in Keycloak that allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the UPLOAD_SCRIPTS feature is disabled

7.2CVSS6.7AI score0.00235EPSS
CVE
CVE
added 2021/05/12 3:15 p.m.102 views

CVE-2021-20202

A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to...

7.3CVSS6.9AI score0.00046EPSS
CVE
CVE
added 2020/09/16 4:15 p.m.101 views

CVE-2020-10758

A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.

7.5CVSS7.2AI score0.00529EPSS
CVE
CVE
added 2020/11/09 5:15 p.m.98 views

CVE-2020-14366

A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw

7.5CVSS7.3AI score0.00384EPSS
CVE
CVE
added 2021/03/23 5:15 p.m.95 views

CVE-2021-20222

A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

7.5CVSS7.3AI score0.00511EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.91 views

CVE-2021-3632

A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.

7.5CVSS7.2AI score0.00135EPSS
CVE
CVE
added 2019/10/15 7:15 p.m.88 views

CVE-2019-14832

A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.

7.5CVSS7AI score0.00383EPSS
CVE
CVE
added 2017/10/26 5:29 p.m.86 views

CVE-2017-12160

It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself contin...

7.2CVSS6.8AI score0.0046EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.85 views

CVE-2021-3461

A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].

7.1CVSS6.6AI score0.00052EPSS
CVE
CVE
added 2018/07/27 6:29 p.m.73 views

CVE-2017-2646

It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.

7.5CVSS7.2AI score0.00503EPSS