Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12160

Опубликовано: 17 окт. 2017
Источник: redhat
CVSS3: 3.1
EPSS Низкий

Описание

It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4keycloakWill not fix
Red Hat Single Sign-On 7.1FixedRHSA-2017:290617.10.2017
Red Hat Single Sign-On 7.1 for RHEL 6rh-sso7-keycloakFixedRHSA-2017:290417.10.2017
Red Hat Single Sign-On 7.1 for RHEL 7rh-sso7-keycloakFixedRHSA-2017:290517.10.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=1484154keycloak: resource privilege extension via access token in oauth

EPSS

Процентиль: 68%
0.00571
Низкий

3.1 Low

CVSS3

Связанные уязвимости

CVSS3: 7.2
nvd
больше 8 лет назад

It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.

CVSS3: 7.2
debian
больше 8 лет назад

It was found that Keycloak oauth would permit an authenticated resourc ...

CVSS3: 7.2
github
больше 3 лет назад

Keycloak Oauth Implementation Error

EPSS

Процентиль: 68%
0.00571
Низкий

3.1 Low

CVSS3