Количество 5
Количество 5
CVE-2023-4918
A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.
CVE-2023-4918
A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment.
CVE-2023-4918
A flaw was found in the Keycloak package, more specifically org.keyclo ...
GHSA-5q66-v53q-pm35
Keycloak vulnerable to Plaintext Storage of User Password
BDU:2023-06025
Уязвимость компонента org.keycloak.userprofile программного средства для управления идентификацией и доступом Keycloak, позволяющая нарушителю получить доступ к учетным данным пользователей
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-4918 A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment. | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-4918 A flaw was found in the Keycloak package, more specifically org.keycloak.userprofile. When a user registers itself through registration flow, the "password" and "password-confirm" field from the form will occur as regular user attributes. All users and clients with proper rights and roles are able to read users attributes, allowing a malicious user with minimal access to retrieve the users passwords in clear text, jeopardizing their environment. | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-4918 A flaw was found in the Keycloak package, more specifically org.keyclo ... | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
GHSA-5q66-v53q-pm35 Keycloak vulnerable to Plaintext Storage of User Password | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
BDU:2023-06025 Уязвимость компонента org.keycloak.userprofile программного средства для управления идентификацией и доступом Keycloak, позволяющая нарушителю получить доступ к учетным данным пользователей | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу