Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1388988 | Issue Tracking |
https://access.redhat.com/errata/RHSA-2017:0873 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2017:0872 | Vendor Advisory |
http://www.securitytracker.com/id/1038180 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/97392 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2017-0876.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Information
Published : 2018-03-12 08:29
Updated : 2019-10-09 16:20
NVD link : CVE-2016-8629
Mitre link : CVE-2016-8629
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
redhat
- enterprise_linux_server
- keycloak
- single_sign_on