Описание
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Fuse 7 | keycloak | Will not fix | ||
| Red Hat Mobile Application Platform 4 | keycloak | Out of support scope | ||
| Red Hat OpenShift Application Runtimes | keycloak | Affected | ||
| Red Hat Single Sign-On 7.2.5 zip | server | Fixed | RHSA-2018:3595 | 13.11.2018 |
| Red Hat Single Sign-On 7.2 for RHEL 6 | rh-sso7-keycloak | Fixed | RHSA-2018:3592 | 13.11.2018 |
| Red Hat Single Sign-On 7.2 for RHEL 7 | rh-sso7-keycloak | Fixed | RHSA-2018:3593 | 13.11.2018 |
| Text-Only RHOAR | Fixed | RHSA-2019:0877 | 24.04.2019 |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=1599434keycloak: auth permitted with expired certs in SAML client
5.4 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.4
nvd
больше 7 лет назад
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
CVSS3: 5.4
debian
больше 7 лет назад
It was found that SAML authentication in Keycloak 3.4.3.Final incorrec ...
5.4 Medium
CVSS3