Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0876.html | Third Party Advisory |
http://www.securityfocus.com/bid/97392 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038180 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:0872 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2017:0873 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1388988 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
No history.
Information
Published : 2018-03-12 15:29
Updated : 2024-02-28 16:25
NVD link : CVE-2016-8629
Mitre link : CVE-2016-8629
CVE.ORG link : CVE-2016-8629
JSON object : View
Products Affected
redhat
- single_sign_on
- enterprise_linux_server
- keycloak