Описание
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Mobile Application Platform 4 | keycloak | Will not fix | ||
| Red Hat Single Sign-On 7.1 | Fixed | RHSA-2017:2906 | 17.10.2017 | |
| Red Hat Single Sign-On 7.1 for RHEL 6 | rh-sso7-keycloak | Fixed | RHSA-2017:2904 | 17.10.2017 |
| Red Hat Single Sign-On 7.1 for RHEL 7 | rh-sso7-keycloak | Fixed | RHSA-2017:2905 | 17.10.2017 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.1 Low
CVSS3
Связанные уязвимости
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
It was found that Keycloak oauth would permit an authenticated resourc ...
EPSS
3.1 Low
CVSS3