Lucene search

K
RedhatKeycloak

7 matches found

CVE
CVE
added 2023/01/13 6:15 a.m.309 views

CVE-2022-3782

keycloak: path traversal via double URL encoding. A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the...

9.1CVSS8.9AI score0.00097EPSS
CVE
CVE
added 2022/07/08 12:15 a.m.206 views

CVE-2022-1245

A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to a...

9.8CVSS9.4AI score0.00396EPSS
CVE
CVE
added 2021/05/28 11:15 a.m.115 views

CVE-2021-20195

A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is...

9.6CVSS8.7AI score0.00305EPSS
CVE
CVE
added 2020/01/07 5:15 p.m.112 views

CVE-2019-14837

A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be '[email protected]'.

9.1CVSS9AI score0.01008EPSS
CVE
CVE
added 2020/03/02 5:15 p.m.87 views

CVE-2020-1731

A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.

9.8CVSS9.3AI score0.00389EPSS
CVE
CVE
added 2019/12/05 3:15 p.m.79 views

CVE-2019-14910

A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.

9.8CVSS9.6AI score0.00436EPSS
CVE
CVE
added 2019/12/04 3:15 p.m.47 views

CVE-2019-14909

A vulnerability was found in Keycloak 7.x where the user federation LDAP bind type is none (LDAP anonymous bind), any password, invalid or valid will be accepted.

9.3CVSS8.1AI score0.00291EPSS