Описание
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Issue TrackingPatchVendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Issue TrackingPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:redhat:keycloak:3.4.3:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:a:redhat:single_sign-on:7.2:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 17%
0.00054
Низкий
5.4 Medium
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-345
CWE-295
Связанные уязвимости
CVSS3: 5.4
redhat
около 7 лет назад
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
CVSS3: 5.4
debian
около 7 лет назад
It was found that SAML authentication in Keycloak 3.4.3.Final incorrec ...
EPSS
Процентиль: 17%
0.00054
Низкий
5.4 Medium
CVSS3
5.5 Medium
CVSS2
Дефекты
CWE-345
CWE-295