Описание
Forced Logout in keycloak-connect
Versions of keycloak-connect prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the /k_logout route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.
Recommendation
Upgrade to version 4.4.0 or later.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-10157
- https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157
- https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920
- https://www.npmjs.com/advisories/978
- http://www.securityfocus.com/bid/108734
Пакеты
keycloak-connect
< 4.8.3
4.8.3
Связанные уязвимости
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.
It was found that Keycloak's Node.js adapter before version 4.8.3 did ...