Описание
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
Ссылки
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Vendor Advisory
- Issue Tracking
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Vendor Advisory
- Issue Tracking
Уязвимые конфигурации
Конфигурация 1Версия до 2.5.1 (исключая)
cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
Одно из
cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00671
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 3.7
redhat
почти 9 лет назад
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
CVSS3: 5.9
debian
почти 8 лет назад
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC ve ...
CVSS3: 5.9
github
больше 7 лет назад
keycloak-core vulnerable to timing attacks against JWS token verification
EPSS
Процентиль: 71%
0.00671
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200