Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12161

Опубликовано: 14 дек. 2017
Источник: redhat
CVSS3: 4.2

Описание

It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.

it was found that keycloak would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Mobile Application Platform 4keycloakWill not fix
Red Hat Single Sign-On 7rh-sso7-keycloakAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-602
https://bugzilla.redhat.com/show_bug.cgi?id=1484564keycloak: reset password token disclosure

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 8 лет назад

It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.

CVSS3: 8.8
debian
почти 8 лет назад

It was found that keycloak before 3.4.2 final would permit misuse of a ...

github
больше 7 лет назад

Moderate severity vulnerability that affects org.keycloak:keycloak-core

4.2 Medium

CVSS3