CVE-2021-4133

A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:36

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2033602 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2033602 - Issue Tracking, Third Party Advisory
References () https://github.com/keycloak/keycloak/issues/9247 - Third Party Advisory () https://github.com/keycloak/keycloak/issues/9247 - Third Party Advisory
References () https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487 - Third Party Advisory () https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable () https://www.oracle.com/security-alerts/cpuapr2022.html - Not Applicable

Information

Published : 2022-01-25 20:15

Updated : 2024-11-21 06:36


NVD link : CVE-2021-4133

Mitre link : CVE-2021-4133

CVE.ORG link : CVE-2021-4133


JSON object : View

Products Affected

redhat

  • keycloak
CWE
CWE-863

Incorrect Authorization