Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3875

Опубликовано: 11 июн. 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7keycloakWill not fix
Red Hat Mobile Application Platform 4keycloakOut of support scope
Red Hat OpenShift Application RuntimeskeycloakOut of support scope
Red Hat Single Sign-On 7rh-sso7-keycloakAffected
Red Hat support for Spring BootkeycloakAffected
Red Hat Runtimes Spring Boot 2.1.12keycloakFixedRHSA-2020:236604.06.2020
Red Hat Single Sign-On 7.3.2 zipFixedRHSA-2019:145611.06.2019
Text-Only RHOARFixedRHSA-2020:206718.05.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-345->CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1690628keycloak: missing signatures validation on CRL used to verify client certificates

EPSS

Процентиль: 15%
0.00047
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
debian
больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenti ...

CVSS3: 4.8
github
больше 6 лет назад

Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak

EPSS

Процентиль: 15%
0.00047
Низкий

6.5 Medium

CVSS3