Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000500

Опубликовано: 14 дек. 2017
Источник: redhat
CVSS3: 4.2

Описание

[REJECTED CVE] A vulnerability has been identified where keycloak would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.

Отчет

This flaw was found to be a duplicate of CVE-2017-12161. Please see https://access.redhat.com/security/cve/CVE-2017-12161 for information about affected products and security errata.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4keycloakNot affected
Red Hat Single Sign-On 7rh-sso7-keycloakNot affected

Показывать по

Дополнительная информация

Дефект:
CWE-99
https://bugzilla.redhat.com/show_bug.cgi?id=1533319keycloak: Host header injection in password reset page can allow for poisoned URL

4.2 Medium

CVSS3

Связанные уязвимости

nvd
около 8 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-12161. Reason: This candidate is a reservation duplicate of CVE-2017-12161. Notes: All CVE users should reference CVE-2017-12161 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage

github
больше 7 лет назад

Moderate severity vulnerability that affects org.keycloak:keycloak-core

4.2 Medium

CVSS3