Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38cg-gg9j-q9j9

Опубликовано: 27 июн. 2019
Источник: github
Github: Прошло ревью
CVSS3: 4.8

Описание

Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

Пакеты

Наименование

org.keycloak:keycloak-core

maven
Затронутые версииВерсия исправления

<= 6.0.1

Отсутствует

EPSS

Процентиль: 15%
0.00047
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-295
CWE-345

Связанные уязвимости

CVSS3: 6.5
redhat
больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
nvd
больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
debian
больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenti ...

EPSS

Процентиль: 15%
0.00047
Низкий

4.8 Medium

CVSS3

Дефекты

CWE-295
CWE-345