Логотип exploitDog
bind:CVE-2019-3875
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-3875

Количество 4

Количество 4

redhat логотип

CVE-2019-3875

больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-3875

больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-3875

больше 6 лет назад

A vulnerability was found in keycloak before 6.0.2. The X.509 authenti ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-38cg-gg9j-q9j9

больше 6 лет назад

Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak

CVSS3: 4.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2019-3875

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-3875

A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-3875

A vulnerability was found in keycloak before 6.0.2. The X.509 authenti ...

CVSS3: 6.5
0%
Низкий
больше 6 лет назад
github логотип
GHSA-38cg-gg9j-q9j9

Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak

CVSS3: 4.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу