Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10157

Опубликовано: 11 июн. 2019
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.

It was found that Keycloak's Node.js adapter did not properly verify the web token received from the server in its backchannel logout. An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7keycloakNot affected
Red Hat Mobile Application Platform 4keycloakOut of support scope
Red Hat OpenShift Application RuntimeskeycloakNot affected
Red Hat Single Sign-On 7rh-sso7-keycloakAffected
Red Hat Single Sign-On 7.3.2 zipFixedRHSA-2019:145611.06.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-345
https://bugzilla.redhat.com/show_bug.cgi?id=1702953keycloak: Node.js adapter internal NBF can be manipulated leading to DoS.

EPSS

Процентиль: 4%
0.00019
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
nvd
больше 6 лет назад

It was found that Keycloak's Node.js adapter before version 4.8.3 did not properly verify the web token received from the server in its backchannel logout . An attacker with local access could use this to construct a malicious web token setting an NBF parameter that could prevent user access indefinitely.

CVSS3: 4.7
debian
больше 6 лет назад

It was found that Keycloak's Node.js adapter before version 4.8.3 did ...

CVSS3: 5.5
github
больше 6 лет назад

Forced Logout in keycloak-connect

EPSS

Процентиль: 4%
0.00019
Низкий

4.7 Medium

CVSS3