A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837 | Exploit Issue Tracking Vendor Advisory |
https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f | Patch Third Party Advisory |
https://issues.jboss.org/browse/KEYCLOAK-10780 | Issue Tracking Permissions Required Vendor Advisory |
Configurations
History
No history.
Information
Published : 2020-01-07 17:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-14837
Mitre link : CVE-2019-14837
CVE.ORG link : CVE-2019-14837
JSON object : View
Products Affected
redhat
- single_sign-on
- keycloak