CVE-2020-1731

A flaw was found in all versions of the Keycloak operator, before version 8.0.2,(community only) where the operator generates a random admin password when installing Keycloak, however the password remains the same when deployed to the same OpenShift namespace.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak_operator:*:*:*:*:community:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1731 - Issue Tracking, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 9.1

Information

Published : 2020-03-02 17:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1731

Mitre link : CVE-2020-1731

CVE.ORG link : CVE-2020-1731


JSON object : View

Products Affected

redhat

  • keycloak_operator
CWE
CWE-341

Predictable from Observable State

CWE-330

Use of Insufficiently Random Values