Lucene search

K

13 matches found

CVE
CVE
added 2022/08/23 4:15 p.m.2296 views

CVE-2021-3827

A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The high...

6.8CVSS6.7AI score0.00092EPSS
CVE
CVE
added 2022/07/08 12:15 a.m.206 views

CVE-2022-1245

A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to a...

9.8CVSS9.4AI score0.00396EPSS
CVE
CVE
added 2022/03/25 7:15 p.m.190 views

CVE-2021-20323

A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.

6.1CVSS6AI score0.7008EPSS
CVE
CVE
added 2022/01/25 8:15 p.m.158 views

CVE-2021-4133

A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.

8.8CVSS8.3AI score0.00134EPSS
CVE
CVE
added 2022/04/26 7:15 p.m.143 views

CVE-2022-1466

Due to improper authorization, Red Hat Single Sign-On is vulnerable to users performing actions that they should not be allowed to perform. It was possible to add users to the master realm even though no respective permission was granted.

6.5CVSS6.2AI score0.00255EPSS
CVE
CVE
added 2022/08/26 6:15 p.m.124 views

CVE-2022-0225

A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.

5.4CVSS4.9AI score0.00348EPSS
CVE
CVE
added 2022/08/22 3:15 p.m.118 views

CVE-2021-3513

A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.

7.5CVSS7.1AI score0.00174EPSS
CVE
CVE
added 2022/08/05 5:15 p.m.106 views

CVE-2022-2668

An issue was discovered in Keycloak that allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the UPLOAD_SCRIPTS feature is disabled

7.2CVSS6.7AI score0.00235EPSS
CVE
CVE
added 2022/08/23 4:15 p.m.94 views

CVE-2020-35509

A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.

5.4CVSS5.1AI score0.00105EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.93 views

CVE-2021-3754

A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.

5.3CVSS5.1AI score0.04922EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.91 views

CVE-2021-3632

A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.

7.5CVSS7.2AI score0.00135EPSS
CVE
CVE
added 2022/04/01 11:15 p.m.85 views

CVE-2021-3461

A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].

7.1CVSS6.6AI score0.00052EPSS
CVE
CVE
added 2022/08/26 4:15 p.m.80 views

CVE-2021-3856

ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.

4.3CVSS4.5AI score0.0016EPSS