Lucene search

K
RedhatKeycloak

13 matches found

CVE
CVE
added 2023/09/25 8:15 p.m.5273 views

CVE-2022-4137

A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be...

8.1CVSS6.2AI score0.00393EPSS
CVE
CVE
added 2024/04/17 2:15 p.m.389 views

CVE-2024-1132

A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. This issue could allow an attacker to construct a malicious request to bypass validation and access other URLs and sensitive information within the domain or conduct further attacks. This flaw affects any...

8.1CVSS5.7AI score0.00177EPSS
CVE
CVE
added 2024/04/25 4:15 p.m.282 views

CVE-2023-6787

A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter thei...

8.8CVSS6.4AI score0.00423EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.158 views

CVE-2021-4133

A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.

8.8CVSS8.3AI score0.00134EPSS
CVE
CVE
added 2020/05/13 7:15 p.m.139 views

CVE-2020-1714

A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code...

8.8CVSS8.5AI score0.02152EPSS
CVE
CVE
added 2020/11/17 2:15 a.m.137 views

CVE-2020-14389

It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have.

8.1CVSS7.7AI score0.00148EPSS
CVE
CVE
added 2020/05/12 9:15 p.m.125 views

CVE-2020-1718

A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.

8.8CVSS8.4AI score0.00367EPSS
CVE
CVE
added 2018/11/30 1:29 p.m.106 views

CVE-2018-14637

The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.

8.1CVSS7.7AI score0.00252EPSS
CVE
CVE
added 2019/08/14 5:15 p.m.106 views

CVE-2019-10201

It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users ...

8.1CVSS7.9AI score0.00143EPSS
CVE
CVE
added 2019/08/14 5:15 p.m.104 views

CVE-2019-10199

It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.

8.8CVSS8.4AI score0.00129EPSS
CVE
CVE
added 2023/09/12 8:15 p.m.74 views

CVE-2023-4918

A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able ...

8.8CVSS8.4AI score0.00081EPSS
CVE
CVE
added 2018/08/01 5:29 p.m.70 views

CVE-2016-8609

It was found that the keycloak before 2.3.0 did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.

8.1CVSS7.8AI score0.00157EPSS
CVE
CVE
added 2018/11/13 7:29 p.m.58 views

CVE-2018-14657

A flaw was found in Keycloak 4.2.1.Final, 4.3.0.Final. When TOPT enabled, an improper implementation of the Brute Force detection algorithm will not enforce its protection measures.

8.1CVSS7.8AI score0.00387EPSS