Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3754

Опубликовано: 30 мая 2022
Источник: redhat
CVSS3: 3.7

Описание

A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.

Меры по смягчению последствий

The workaround is to enable "Email as username" flag or disable "Login with email" in the login settings

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7keycloakNot affected
Red Hat OpenShift Application RuntimeskeycloakNot affected
Red Hat Process Automation 7keycloakNot affected
Red Hat Single Sign-On 7rh-sso7-keycloakNot affected
Red Hat support for Spring BootkeycloakNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1999196keycloak: allows using email as username

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 3 лет назад

A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.

CVSS3: 5.3
debian
больше 3 лет назад

A flaw was found in keycloak where an attacker is able to register him ...

CVSS3: 3.7
github
больше 1 года назад

Keycloak's improper input validation allows using email as username

3.7 Low

CVSS3