CVE-2016-8629

Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-03-12 15:29

Updated : 2024-02-28 16:25


NVD link : CVE-2016-8629

Mitre link : CVE-2016-8629

CVE.ORG link : CVE-2016-8629


JSON object : View

Products Affected

redhat

  • single_sign_on
  • enterprise_linux_server
  • keycloak
CWE
CWE-264

Permissions, Privileges, and Access Controls

CWE-284

Improper Access Control