It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-1203.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=1445271 | Issue Tracking Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2017-1203.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=1445271 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2017-1203.html - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1445271 - Issue Tracking, Third Party Advisory, VDB Entry |
Information
Published : 2017-05-12 19:29
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7474
Mitre link : CVE-2017-7474
CVE.ORG link : CVE-2017-7474
JSON object : View
Products Affected
keycloak
- keycloak-nodejs-auth-utils
CWE