CVE-2019-14837

A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837 Exploit Issue Tracking Vendor Advisory
https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f Patch Third Party Advisory
https://issues.jboss.org/browse/KEYCLOAK-10780 Issue Tracking Permissions Required Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-01-07 17:15

Updated : 2024-02-28 17:28


NVD link : CVE-2019-14837

Mitre link : CVE-2019-14837

CVE.ORG link : CVE-2019-14837


JSON object : View

Products Affected

redhat

  • single_sign-on
  • keycloak
CWE
CWE-798

Use of Hard-coded Credentials

CWE-547

Use of Hard-coded, Security-relevant Constants